Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
risk analysis
biblio
An Information Security Risk Assessment Algorithm Based on Risk Propagation in Energy Internet
Submitted by grigby1 on Mon, 03/05/2018 - 12:11pm
partitions
threat propagation effect
security of data
security
RM algorithm
risk management
risk analysis
Resiliency
resilience
pubcrawl
propagation risk value
propagation effect
power systems
power engineering computing
composability
Nickel
Metrics
matrix algebra
logical network location
ISRADRP
internet
information system
information security risk assessment algorithm
information security risk assessment
energy internet
Dynamic Risk Propagation
dynamic networks
Dependency Structure Matrix
biblio
Considerations for secure and resilient satellite architectures
Submitted by K_Hooper on Fri, 02/02/2018 - 10:06am
Resiliency
aerospace computing
Aerospace electronics
architectural design considerations
artificial satellites
cyber-physical systems)
data confidentiality
data integrity
ground segment
notional satellite architecture
Orbits
potential attack vectors
potential security risks
Propulsion
pubcrawl
Vulnerability Analysis
resilient satellite architectures
Resilient Security Architectures
risk analysis
satellite architecture
Satellite broadcasting
Satellites
secure satellite architectures
security
security of data
security vulnerabilities
Space vehicles
spacecraft systems
systems-level approach
uplink/downlink components
biblio
Threat Assessment in the Cloud Environment: A Quantitative Approach for Security Pattern Selection
Submitted by K_Hooper on Wed, 11/01/2017 - 10:10am
Cloud Computing
expert systems
Human behavior
pubcrawl
resilience
risk analysis
Scalability
security patterns
STRIDE-DREAD Model
threat assessment
biblio
Classification of Insider Threat Detection Techniques
Submitted by grigby1 on Tue, 08/22/2017 - 10:47am
Access Control
collaboration
Human behavior
Human Factors
Insider Threat Detection
Insider Threats
Metrics
pubcrawl
Resiliency
risk analysis
biblio
Causes of Human Errors in Early Risk Assesment in Software Project Management
Submitted by grigby1 on Mon, 03/20/2017 - 9:14am
coding theory
composability
Early Risks
grounded theory
Human Errors
Metrics
online Security
Resiliency
risk analysis
security
biblio
Causes of Human Errors in Early Risk Assesment in Software Project Management
Submitted by grigby1 on Fri, 03/17/2017 - 12:31pm
coding theory
composability
Early Risks
grounded theory
Human Errors
Metrics
online Security
pubcrawl
Resiliency
risk analysis
security
biblio
Vulnerability analysis related to extraordinary events in power systems
Submitted by grigby1 on Wed, 03/08/2017 - 1:30pm
power system faults
Vulnerability
security
risk analysis
Risk
pubcrawl170112
power system vulnerability
power system simulation
power system reliability
Companies
power system
Power supplies
operating states
Meteorology
fault diagnosis
Extraordinary events
emergency preparedness
critical contingencies
biblio
Research on income distribution model of supply chain financing based on third-party trading platform
Submitted by grigby1 on Wed, 03/08/2017 - 1:26pm
industrial economics
third-party trading platform
supply chains
supply chain financing
Stability analysis
Shapley value
security
risk correction factors
risk analysis
remuneration
pubcrawl170112
AHP
income unequal distribution
income fluctuation
income distribution model
game theory
ethics
cooperative game
Companies
Banking
analytic hierarchy process
biblio
Risk assessment of agricultural supply chain based on AHP- FCS in Eastern Area of Hunan Province
Submitted by grigby1 on Wed, 03/08/2017 - 1:26pm
natural disasters
the AHP- FCS method
supply chains
Supply Chain
security
risk management
risk assessment
risk analysis
Reliability
pubcrawl170112
agricultural product
Hunan province
fuzzy set theory
fuzzy comprehensive analysis
Face
economic development stability
analytic hierarchy process
AHP- FCS
agricultural supply chain
agricultural products
biblio
A proven method for identifying security gaps in international postal and transportation critical infrastructure
Submitted by grigby1 on Wed, 03/08/2017 - 1:24pm
supply chain management
resilince management
risk analysis
security
security gap identification
security risk mitigation
shipping processing facilities
ships
Standards organizations
pubcrawl170112
surface to-air missile system
Transportation
transportation critical infrastructure security
transportation processing facilities
United States Postal Inspection Service
UPU standards
USPIS
worldwide commerce
international scale
critical transportation services
field instrument
global supply chain
Inspection
Instruments
international community
international mail processing centers
international postal infrastructure
critical infrastructures
military aircraft
missiles
National security
Organizations
physical security
physical security assessment method
Postal services
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »