Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Security Risk Estimation
biblio
Alternatives to Fault Injections for Early Safety/Security Evaluations
Submitted by aekwall on Mon, 03/09/2020 - 11:17am
Human Factors
Security Risk Estimation
system dependability constraints
RTL fault injection campaigns
radiation testing
market pressure
ISO 26262
intertwined hardware
HW-SW systems
functional safety standards
fault injections
dependability analysis
cyber physical systems
hardware-software codesign
Circuit faults
CPS
Safety
safety-critical software
ISO standards
cost reduction
Reliability
Metrics
pubcrawl
Resiliency
Time measurement
system-on-chip
SoC
embedded systems
Software
Hardware
Scalability
security of data
biblio
Multi-domain Embedding Strategies for Video Steganography by Combining Partition Modes and Motion Vectors
Submitted by aekwall on Mon, 03/09/2020 - 11:17am
MV domain
distortion-minimization framework
embedding capacity
embedding domains
image motion analysis
MDE strategies
motion estimation
motion vectors
multidomain embedding strategies
discrete cosine transforms
partition modes
potential security risks
sequential embedding
Steganography
video steganography
Video-steganography
Security Risk Estimation
minimisation
security
Resiliency
pubcrawl
Metrics
data encapsulation
video signal processing
distortion
Human Factors
Scalability
encoding
Quantization (signal)
Binary codes
-motion-vector
-multi-domain-embedding
-partition-mode
digital video
biblio
A Data-Driven Dynamic State Estimation for Smart Grids under DoS Attack using State Correlations
Submitted by aekwall on Mon, 03/09/2020 - 11:17am
Scalability
Resiliency
pubcrawl
Metrics
smart grid security
Human Factors
time series
cyber attack
data-driven dynamic state estimation
state correlations
Security Risk Estimation
biblio
Secure estimation for intelligent connected vehicle systems against sensor attacks
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
Acceleration
Security Risk Estimation
state estimator
sensor attacks
Sensor attack
intelligent control
Intelligent connected vehicles
intelligent connected vehicle system
Channel estimation
closed loop systems
secure estimation
vehicular ad hoc network
telecommunication control
wireless channels
connected vehicles
road vehicles
estimation
Human Factors
Stability analysis
cyber-attacks
Metrics
Wireless communication
Communication system security
vehicular ad hoc networks
telecommunication power management
wireless sensor networks
pubcrawl
Resiliency
telecommunication security
Scalability
biblio
Estimation of Information System Security Using Hybrid Simulation in AnyLogic
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
Petri nets
Security Risk Estimation
perimeter protection
Object oriented modeling
information system security
hybrid simulation
discrete event simulation
deterministic and probabilistic model
context-role
Permission
security system analysis
business data processing
Human Factors
security of data
Information systems
Probabilistic logic
Mathematical model
optimisation
Data protection
optimization
Metrics
pubcrawl
Resiliency
information security
Scalability
biblio
Risk Assessment Approach to Secure Northbound Interface of SDN Networks
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
risk assessment
traffic demand requests
telecommunication traffic
software defined networking
Security Risk Estimation
security
secure Northbound interface
SDN network administrators
SDN
Scalability
risk management
risk assessment approach
accurate risk estimation
Resiliency
RAMSES
pubcrawl
Northbound-API
network optimization tool
network cost
Metrics
Human Factors
computer network security
computer network management
application program interfaces
biblio
A Systematic Requirements and Risks-Based Test Case Prioritization Using a Fuzzy Expert System
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
requirements risks-based testing
testing
test case prioritization
systematic requirements
software requirements
software engineers
software engineering
software components
Software
Security Risk Estimation
security
Scalability
risk-based approaches
risk information
risk estimation process
Resiliency
False Data Detection
regression testing
regression analysis
pubcrawl
program testing
Metrics
Iron
Human Factors
Human behavior
fuzzy set theory
fuzzy expert systems
fuzzy expert system
Expert Systems and Security
expert systems
estimation
Complexity theory
biblio
Privacy Risk Assessment for Data Subject-Aware Threat Modeling
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
data subject-aware threat modeling
Privacy Risk
privacy by design
Monte Carlo methods
GDPR
Context modeling
data flow diagram system models
data protection by design
data subject-aware privacy risk assessment model
Human Factors
General Data Protection Regulation
Monte Carlo simulations
privacy risk assessment
privacy threat modeling activities
risk estimation approach
threat modeling tool prototype
Security Risk Estimation
Threat Modeling
risk analysis
data privacy
risk assessment
risk management
Analytical models
Data protection
data flow analysis
Metrics
privacy
pubcrawl
Resiliency
Data models
security
Scalability
security of data
biblio
Quantile based risk measures in cyber security
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
data breach information
Security Risk Estimation
value at risk estimation
Value at Risk
tail value at risk
Risk measures
quantile based risk measures
Privacy Rights Clearinghouse
pricing cyber insurance contracts
insurance data processing
insurance companies
financial sector
security of data
cyber value at risk
cyber risk
Chronology of data breaches
Human Factors
risk management
Metrics
pubcrawl
Resiliency
cyber security
data privacy
Scalability
biblio
A Model-Based Time-to-Compromise Estimator to Assess the Security Posture of Vulnerable Networks
Submitted by grigby1 on Wed, 10/23/2019 - 12:36pm
patch management
uncertainty
Security Risk Management
Security Risk Estimation
security
Scalability
risk management
risk assessment
Resiliency
resilience
pubcrawl
Security Metrics
NIST
Monte Carlo simulation
Metrics
Measurement
Human Factors
Human behavior
estimation
computer science
Comparative security metric
« first
‹ previous
1
2
3
4
5
next ›
last »