Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information security
biblio
A Blockchain and ABAC Based Data Access Control Scheme in Smart Grid
Submitted by grigby1 on Fri, 01/20/2023 - 4:06pm
blockchain
information sharing
blockchains
File systems
smart contract
data sharing
smart grid security
Metrics
smart contracts
information security
ABAC
process control
Access Control
Scalability
Resiliency
resilience
pubcrawl
biblio
Vulnerabilities and Strategies of Cybersecurity in Smart Grid - Evaluation and Review
Submitted by grigby1 on Fri, 01/20/2023 - 4:06pm
Smart Grids
power system reliability
cyber attackers
cyber security
smart grid security
Power Grid
renewable energy sources
Reliability
Metrics
information security
control systems
Smart Grid
Computer crime
Scalability
Resiliency
resilience
pubcrawl
biblio
Research on cloud security construction of power grid in smart era
Submitted by grigby1 on Fri, 01/20/2023 - 4:05pm
Cloud Computing
information security
pubcrawl
resilience
Resiliency
Scalability
Smart Grid
Planning
Smart Grids
Buildings
Metrics
smart grid security
cloud computing security
Computer applications
Risk
data science
biblio
Big Data Analysis and Mining Technology of Smart Grid Based on Privacy Protection
Submitted by grigby1 on Fri, 01/20/2023 - 3:59pm
information security
pubcrawl
Metrics
Resiliency
privacy
data privacy
Protocols
Smart Grid
Big Data
Companies
privacy protection
Meters
Data mining
Smart Grid Privacy
biblio
Effective Metrics Modeling of Big Data Technology in Electric Power Information Security
Submitted by grigby1 on Fri, 01/13/2023 - 3:18pm
information security
pubcrawl
Metrics
Analytical models
Computational modeling
Big Data
Power measurement
Current measurement
Security Metrics
Costs
Effective Metrics Modeling
electric power
biblio
Redactable Blockchain Using Lattice-based Chameleon Hash Function
Submitted by aekwall on Fri, 01/13/2023 - 3:05pm
information security
Scalability
distributed ledger
pubcrawl
Decision Making
Hash functions
Compositionality
Prototypes
voting
chameleon hashing
consensus mechanism
lattice-based cryptography
redactable blockchain
security scalability
biblio
Threat-driven Risk Assessment for APT Attacks using Risk-Aware Problem Domain Ontology
Submitted by aekwall on Fri, 01/13/2023 - 2:59pm
computer security
Security Risk Management
threat-driven risk assessment
risk-aware problem domain ontology
evidence-based risk evaluation
business process-based asset identification
advanced persistent threat
requirements engineering
Ontologies
information security
risk management
Resiliency
Metrics
Scalability
pubcrawl
Conferences
Human Factors
Organizations
biblio
Intelligent Risk Management using Artificial Intelligence
Submitted by aekwall on Fri, 01/13/2023 - 2:58pm
risk management
Security Risk Management
risk assessment
artificial intelliegence
cyber security
Artificial Intelligence
genetic algorithms
component
Software algorithms
Software
Resiliency
Metrics
Scalability
pubcrawl
optimization
Human Factors
Organizations
information security
biblio
Ensuring Comprehensive Security of Information Systems of Large Financial Organizations
Submitted by aekwall on Fri, 01/13/2023 - 2:57pm
Resiliency
Security Risk Management
risk analysis
quality management
process approach
organization informational system
customer services
information resources
process control
information security
Metrics
Scalability
pubcrawl
Analytical models
Predictive models
Human Factors
Organizations
biblio
Comparative Analysis of Risk Assessment During an Enterprise Information Security Audit
Submitted by grigby1 on Fri, 01/13/2023 - 12:46pm
pubcrawl
Vulnerability
Time measurement
Security Audits
Scalability
risks
risk management
risk assessment
Resiliency
resilience
expert systems
Planning
Organizations
information security audit
information security
Human behavior
Costs
Analytical models
security
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »