Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
risk analysis
biblio
Parametric Analyses of Attack-Fault Trees
Submitted by grigby1 on Tue, 10/06/2020 - 2:01pm
risk assessment
parametric analyses
parametric timed automata
parametric weighted timed automata
power plants
pubcrawl
resilience
Resiliency
risk analysis
parameter values
Safety
safety engineering
security
security of data
tree-based formalism
trees (mathematics)
Unified modeling language
cyber-physical systems
automata
automata theory
composability
Concurrency
connected devices
Cost accounting
CPS
cyber physical systems
attack-fault trees
fault scenarios
fault trees
formal verification
imitator
Logic gates
Metrics
model-checker IMITATOR
biblio
A Game Theoretical Analysis of Risk Adaptive Access Control for Privacy Preserving
Submitted by aekwall on Mon, 09/21/2020 - 3:48pm
Resiliency
Human behavior
information theory
multistage two player game
privacy
privacy breaches
privacy preserving
Privacy Risk
privacy violation access requests
pubcrawl
Games
risk adaptive access control
risk analysis
Risk based access control
risk based access model
risk value
Scalability
Shannon information
sub-game perfect Nash equilibrium
cross-domain environment
Access Control
access control system
access request
Adaptation models
authorisation
Big Data
Cloud Computing
Control Theory and Privacy
Computing Theory and Privacy
cyber physical systems
cyber-physical systems
data privacy
estimation
game model
game theoretical analysis
game theoretical risk based access control
game theory
biblio
Vulnerability Discovery Modelling With Vulnerability Severity
Submitted by grigby1 on Fri, 09/11/2020 - 11:58am
risk analysis
Web browser
vulnerability severity
vulnerability discovery rate
vulnerability discovery process
vulnerability discovery models highlight
vulnerability discovery modelling
Vulnerability discovery model
vulnerability data
vulnerabilities
severity
predictive capability
Browser Security
Compositionality
Browsers
security of data
online front-ends
software vulnerabilities
composability
software fault tolerance
Data models
Mathematical model
Analytical models
Software
resilience
Metrics
Human behavior
pubcrawl
security
Predictive models
biblio
Risk Assessment of Industrial Internet System By Using Game-Attack Graphs
Submitted by aekwall on Mon, 08/17/2020 - 11:17am
search engines
search engine keyword segment matching method
scan components
open services
nondestructive asset profiling
industrial internet system
game-attack graph-based risk assessment model
attribute attack graph
attack rule base
Attack Path
asset threat list
attack graphs
attack graph
Nash Equilibrium
Predictive Metrics
security of data
industrial control
risk analysis
probability
communication protocols
risk assessment
risk management
internet
graph theory
composability
pubcrawl
Resiliency
game theory
Protocols
security
biblio
A Security Evaluation Model Based on Fuzzy Hierarchy Analysis for Industrial Cyber-Physical Control Systems
Submitted by grigby1 on Fri, 07/24/2020 - 12:59pm
Analytical models
Control Theory
security risk assessment
security evaluation model
information security research
information of Industrial cyber-physical control systems
industrial cyber-physical control systems
industrial control system safety risk evaluation
industrial control system risk management decision
fuzzy hierarchy analysis
fuzzy evaluation
fuzzy analytical hierarchy process
security
risk management
industrial control
Safety
cyber-physical systems
fuzzy set theory
pubcrawl
Security Evaluation
security threats
control systems
risk analysis
computer network security
biblio
Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
pubcrawl
tactical risk
Software Vulnerability
software fault tolerance
Servers
security of data
security
Safety
risk management
risk analysis
resource management
Resiliency
resilience
random system faults
CPS resilience
optimal cyber defense remediation
operational technology
Operational Resilience
operational impact assessment
information technology
graph theory
fault graph-based model
Erbium
data-driven attack graph
Damage Assessment
cyber-physical systems
cyber threats
cyber physical systems
biblio
Information Network Risk Assessment Based on AHP and Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:54pm
Metrics
Neural Network Security
system risk value
security risk assessment
risk judgment matrix consistency
neural network technology
neural network
information network security risk assessment application
information network risk assessment
automatic assessment
asset risk value
analytic hierarchy process
AHP method
AHP
information network
risk analysis
security of data
neural nets
information networks
Communication networks
Object recognition
matrix algebra
Resiliency
resilience
policy-based governance
pubcrawl
Neural networks
security
risk management
collaboration
Training
biblio
An Adversarial Risk-based Approach for Network Architecture Security Modeling and Design
Submitted by aekwall on Mon, 05/04/2020 - 11:06am
computer network security
Resiliency
pubcrawl
probability
risk analysis
Network Security Architecture
adversarial risk-based approach
defender
monetary unit
network architecture security modeling design
network critical path design problem
Secure network architecture
security metric
Security Metrics
security risk analysis
System security modeling
biblio
Power of Communication Behind Extreme Cybersecurity Incidents
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
Phishing
surrounding threats
security of data
Scalability
risk mitigations
risk management
risk analysis
Resiliency
resilience
pubcrawl
Protocols
Computational modeling
Pervasive Computing Security
Metrics
internet
Human Factors
Human behavior
extreme cybersecurity incidents
Electronic mail
Cyberspace
Cybersecurity
biblio
A Unified Measurable Software Trustworthy Model Based on Vulnerability Loss Speed Index
Submitted by grigby1 on Fri, 04/03/2020 - 12:19pm
Trusted Computing
software metrics
software reliability
software security
software trust measurement
software trustworthiness
software trustworthy security growth model
software vulnerability datasets
trust measurement
Software measurement
unified measurable software trustworthy model
vulnerability loss speed index
vulnerability occurrence time
vulnerability severity prediction model
Vulnerability severity/type
Vulnerability time
vulnerability time occurrence
complex composite concept
software domain
Software
security
risk analysis
pubcrawl
probability
privacy models and measurement
predictive security metrics
Predictive models
Metrics
loss metric value
Loss measurement
internet technology
Indexes
future loss speed index
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »