Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
risk analysis
biblio
Assessing Information Risks When Using Web Applications Using Fuzzy Logic
Submitted by grigby1 on Mon, 03/29/2021 - 1:04pm
pubcrawl
Web application vulnerability scanner
Web application
vulnerability assessment
security of data
security
risk analysis
Resiliency
resilience
Cyber Physical System
Metrics
internet
information risk concepts
information risk assessment
Information risk
Fuzzy logic
data protection discipline
biblio
Practical Vulnerability-Information-Sharing Architecture for Automotive Security-Risk Analysis
Submitted by grigby1 on Wed, 03/17/2021 - 11:42am
hyper-connected society
automotive security-risk analysis
automotive vehicles
car-hacking studies
car-hacking techniques
common-vulnerabilities- exposure system
cyber kill chain-based cyberattack analysis method
electronic control devices
formal vulnerability-analysis system
automotive industry
ICT environment
information security techniques
mechanical devices
security risk analysis
systematic security-risk-assessment
vehicle-related cyberattacks
vulnerability-information-sharing architecture
Chained Attacks
Computer crime
resilience
Resiliency
automobiles
Automotive engineering
Autonomous Driving
Scalability
5G mobile communication
Industries
pubcrawl
risk analysis
information sharing
traffic engineering computing
Cyber Kill Chain
automotive cybersecurity
Ransomware
5g network
automotive CVE
biblio
Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations
Submitted by grigby1 on Tue, 02/16/2021 - 12:40pm
documentation
Damage Assessment
smart buildings
smart building stakeholders
smart building risk assessment methodology
smart building risk assessment case study
inter-networked control systems
cost effective risk management
comprehensive risk assessment process
Stakeholders
cyber-physical systems
building management systems
Internet of Things
risk analysis
Buildings
control systems
control engineering computing
Resiliency
resilience
pubcrawl
Monitoring
security
risk management
security of data
biblio
A Framework for Risk Assessment in Augmented Reality-Equipped Socio-Technical Systems
Submitted by grigby1 on Wed, 02/03/2021 - 12:10pm
privacy
visualization
technical entities
taxonomy
sociotechnical systems
socio-technical systems
socio-economic effects
security of data
safety modeling
Safety
risk management
risk assessment
risk analysis
resilience
pubcrawl
Analytical models
immersive visual technology
immersive systems
Human Factors
human capabilities
Human behavior
extended human function
dependability threat
cyber physical systems
composability
augmented reality-equipped socio-technical systems
augmented reality
AR-relevant dependability threats
AR-extended human failures
AR-equipped socio-technical systems
biblio
Automated Vulnerability Testing via Executable Attack Graphs
Submitted by aekwall on Mon, 01/25/2021 - 12:04pm
automated vulnerability testing
vulnerability scans
vulnerability assessments
virtual environment
suboptimal decision making
individual attack paths
executable attack graphs
end-to-end process
cyber risk reduction
cyber risk assessments
cyber risk assessment uncertainty
cyber risk assessment process
cyber attack graphs
AVRA
computer network security
automated vulnerability and risk analysis
automatic test software
attack graphs
Predictive Metrics
security issues
risk analysis
Decision Making
reachability analysis
graph theory
composability
pubcrawl
Resiliency
biblio
Network Security Risk Assessment Using Intelligent Agents
Submitted by aekwall on Mon, 11/23/2020 - 10:22am
network connectivity
Data Security
attack graphs
automated intelligent systems
decision-making approach
FCMs
Fuzzy cognitive maps
governmental rules
interconnected network analysis
large networks analysis
attack graph
network graphical representation
network security engineers
network security risk assessment
organisational rules
Risk Prevention
security risk analysis
Intelligent Data Security
Intelligent Data and Security
Decision Making
Scalability
security
Task Analysis
Resiliency
pubcrawl
graph theory
multi-agent systems
tools
computer network security
robots
Communication networks
security breaches
risk analysis
computer networks
Compositionality
multiagent system
data communication
biblio
Modeling and measurement internal threat process based on advanced stochastic model*
Submitted by grigby1 on Fri, 11/20/2020 - 12:52pm
security model
Stochastic Computing Security
threat behaviors
stochastic petri nets
risk measurement
real-time risk measurement
Petri net computing characteristics
network protection
internal threats
Internal Threat
illegal data
firewall-password model
advanced stochastic model
Petri nets
security of data
complex networks
risk analysis
Stochastic processes
Computational modeling
Data models
Scalability
Mathematical model
Analytical models
Resiliency
resilience
pubcrawl
security
biblio
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development
Submitted by grigby1 on Tue, 11/17/2020 - 1:41pm
OWASP
access sensitive information
Android development
data leaks
defensive requirements analysis
development lifecycle
development stage
guided security requirement analysis
Mobile Apps
mobile apps flaws
mobile software engineers
necessary security knowledge
information confidentiality
OWASP mobile top ten risks
OWASP risk analysis driven security requirements specification
secure Android mobile software development
secure mobile SDLC
secure mobile software development education
security defects open doors
security requirements
software developers
useful mobile security guidelines
Operating systems security
software engineering
security
pubcrawl
Metrics
Resiliency
data integrity
security threats
composability
mobile computing
smart phones
malware
software development management
security of data
security vulnerabilities
SDLC
risk analysis
resilience
testing
Detectors
Mobile Applications
Banking
Android (operating system)
security holes
biblio
CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems
Submitted by grigby1 on Wed, 11/04/2020 - 12:35pm
reference CSB system
fault tolerant computing
malicious activities
malicious insider threats
Measurement
Metrics
metrics testing
multicloud strategy
open systems
proactive security risk analysis
pubcrawl
fault tolerance
risk analysis
risk management
Secure Configuration
security
security complexities
Security Metrics
security of data
security risk assessment
storage management
cloud security system
Attack Surfaces
auditing
BrokerMonkey
bucket policy misconfigurations
Cascading style sheets
chaos engineering failure injection strategies
Cloud Audit
cloud auditing schemes
Cloud Computing
API interoperability issues
cloud storage broker systems
cloud storage services
Cloud-Security
CloudRAID
Common Configuration Scoring System
Computational modeling
continuous snapshotting mechanism
CSB resource audits
CSBAuditor
biblio
Empirical Methodology of Testing Using FMEA and Quality Metrics
Submitted by grigby1 on Wed, 11/04/2020 - 12:34pm
pubcrawl
testers
structured metrics
Software Testing
software metrics
software engineering
Software
security
science
risk metrics
risk items
risk areas
risk analysis
Quality metrics
Computer bugs
program testing
metrics testing
Metrics
Measurement
indispensable part
FMEA technique
FMEA
failure analysis
engineering discipline
empirical methodology
efficient metrics
effective testing process
Conferences
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »