Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
risk analysis
biblio
Privacy Risk Assessment for Data Subject-Aware Threat Modeling
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
data subject-aware threat modeling
Privacy Risk
privacy by design
Monte Carlo methods
GDPR
Context modeling
data flow diagram system models
data protection by design
data subject-aware privacy risk assessment model
Human Factors
General Data Protection Regulation
Monte Carlo simulations
privacy risk assessment
privacy threat modeling activities
risk estimation approach
threat modeling tool prototype
Security Risk Estimation
Threat Modeling
risk analysis
data privacy
risk assessment
risk management
Analytical models
Data protection
data flow analysis
Metrics
privacy
pubcrawl
Resiliency
Data models
security
Scalability
security of data
biblio
Early Hybrid Safety and Security Risk Assessment Based on Interdisciplinary Dependency Models
Submitted by grigby1 on Mon, 02/17/2020 - 5:07pm
security risks
risk analysis
risk management
Safety
safety assessment
security
security assessment
security design weaknesses
security risk assessment
Resiliency
security weaknesses
social reasons
Software
system complexity
system operation
tools
Unified modeling language
complex critical infrastructures
resilience
pubcrawl
policy-based governance
modeling
Model driven engineering
Metrics
interdisciplinary interactions
interdisciplinary dependency models
hybrid safety
Human behavior
fault trees
environmental reasons
economic reasons
Design Process
critical infrastructures
biblio
Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements
Submitted by grigby1 on Mon, 02/17/2020 - 5:04pm
risk analysis
graph theory
managed assets
Organizations
potential hacking paths
prioritizes surgical requirements
prioritizing Agile Security requirements
process control
pubcrawl
Remediation Requirements
requirements backlog
Requirements Prioritization
graph analytics
risk management
risk-reduction security requirements
Scalability
security
Security Operation Center
security requirements
security scalability
software prototyping
Standards organizations
virtual adversary attack paths
business risks
Agile Security models different types
agile style
attack graph
Attack Path
attack surface
attack surface reduction
Big Data
Big Data Analytics
business data processing
business process targets
business processes
Agile Security
cardinal assets
complex big data graph
Compositionality
Computer crime
constant prioritization
critical assets identification
cyber attack graphs
Cyber Digital Twin
cyber-attacks
data analysis
biblio
Risk and avoidance strategy for blocking mechanism of SDN-based security service
Submitted by aekwall on Mon, 02/17/2020 - 2:28pm
Monitoring
Switches
software-defined network
software defined networking
Security Risk Management
security
SDN-based Security Services
SDN-based security service
SDN security
SDN attack
Scalability
risk management
risk analysis
Resiliency
pubcrawl
Protocols
Dynamic Networks and Security
Metrics
malicious host
IP networks
IP forging
IEC standards
forged packets
forged IP address
dynamic network technology
data planes
cost-effective risk avoidance strategy
computer network security
blocking mechanism
attack scenario
composability
biblio
A Proposed Framework for Ranking Critical Information Assets in Information Security Risk Assessment Using the OCTAVE Allegro Method with Decision Support System Methods
Submitted by aekwall on Mon, 02/17/2020 - 2:28pm
AHP
security risk assesment
SAW
optimal security mitigation steps
OCTAVE Allegro-SAW
OCTAVE Allegro-AHP methods
OCTAVE allegro method
OCTAVE Allegro
information security risk assessment
Decision support systems
decision support system methods
critical information assets
Critical information asset
asset information mitigation
security of data
Security Risk Management
Surface acoustic waves
DSS
Artificial Intelligence
risk analysis
analytic hierarchy process
risk management
Metrics
pubcrawl
Resiliency
information security
Organizations
Scalability
biblio
Security Risk Assessment and Management as Technical Debt
Submitted by aekwall on Mon, 02/17/2020 - 2:27pm
technical debt
technical debt management systems
software development organizations
software design
security risk assessment
security engineering techniques
security debt management approach
security debt
risk-based security engineering processes
risk-based extensions
portfolio-based technical debt management framework
iterative software development
Security Risk Management
information security
security of data
risk analysis
security management
software security
Unified modeling language
software engineering
risk management
Metrics
Iterative methods
pubcrawl
Resiliency
Software
Organizations
Scalability
biblio
Enabling Security-by-Design in Smart Grids: An Architecture-Based Approach
Submitted by aekwall on Mon, 02/17/2020 - 2:16pm
security goals
power engineering computing
power system security
privacy
pubcrawl
RAMI 4.0
Reference Model of I Information Assurance and Security
risk analysis
RMIAS
Scalability
Metrics
security of data
security-by-design
Smart Grid evolution
smart grid security
Smart Grids
smart power grids
sophisticated engineering practices
standards
surplus energy
distributed energy resources
Resiliency
adequate security countermeasures
architecture
architecture-based approach
computer architecture
computer security
control infrastructure
critical infrastructure
critical infrastructures
Resilient Security Architectures
distributed power generation
distributed system
distribution system operators
Energy Distribution Grids
Enterprise Architecture
Europe
grid gatekeepers
methodology
biblio
The positive force of deterrence: Estimating the quantitative effects of target shifting
Submitted by aekwall on Wed, 12/18/2019 - 2:37pm
counter piracy
Terrorism
target shifting
stopping performance
Radiation detectors
low performance security
game theoretic approach
force multiplier
Force measurement
false alarm
deterrence force
counterterrorism
security of data
Deterrence
risk analysis
protection system
resilience
uncertainty
Force
pubcrawl
Human behavior
game theory
Scalability
biblio
A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
Microservices Security
Application Container Security
automatic code generation techniques
business capabilities
cyber risk
diversification index
economics-of-scale incentives
microservice architectures structure
microservices attack surfaces
program compilers
moving target defense mechanism
MSA
multistep attacks
security risk assessment
security risk-oriented software diversification
Transforms
compiler security
security of data
Compositionality
moving target defense
Security Metrics
business data processing
risk analysis
Logic gates
Indexes
Software Architecture
Measurement
Metrics
pubcrawl
Resiliency
Software
security
Scalability
biblio
Reserch on Cyber Attack of Key Measurement and Control Equipment in Power Grid
Submitted by grigby1 on Tue, 11/19/2019 - 3:41pm
safe operation
power grids
Power measurement
power system security
power system stability
pubcrawl
resilience
Resiliency
risk analysis
risk analysis results
power grid vulnerability analysis
security of data
simulation penetration test environment
stable operation
subsequent attack test
subsequent KMCEPG-related attack penetration
terminal critical control devices
terminal key control equipment
test process
vulnerability mining
cyber security risks
Attack process construction
attack process construction technology
Attack test case
attack test cases
attack test results
composability
Computer crime
Control equipment
cyber attack
attack flow construction technology
Grid cyber attack
Grid key control equipment
Grid key measurement equipment
key measurement
Loss measurement
Metrics
operating systems
Power Grid
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »