Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
critical infrastructure
biblio
CySec Game: A Framework and Tool for Cyber Risk Assessment and Security Investment Optimization in Critical Infrastructures
Submitted by grigby1 on Fri, 08/04/2023 - 11:15am
Smart Grids
remote monitoring
attack-defense tree
game theoretic security
game theory
software tools
risk assessment
Software algorithms
Games
critical infrastructure
Cybersecurity
Scalability
Metrics
Human Factors
Human behavior
pubcrawl
CPS
risk management
biblio
Obnoxious Deterrence
Submitted by grigby1 on Fri, 06/30/2023 - 2:33pm
critical infrastructure
pubcrawl
Human behavior
resilience
Resiliency
Scalability
cyberattack
Computer crime
standards
Cyberspace
ethics
Deterrence
Behavioral sciences
compellence
Cyberespionage
biblio
A Functional FMECA Approach for the Assessment of Critical Infrastructure Resilience
Submitted by grigby1 on Fri, 06/09/2023 - 1:14pm
critical infrastructure
risk management
security
pubcrawl
resilience
Benchmark testing
fault tolerance
software reliability
cyber-physical systems
software quality
critical infrastructures
Resiliency
and Criticality Analysis
effects
failure modes
Cybersecurity Damage Assessment
biblio
Operationalizing Resiliency among Childcare Providers during the COVID-19 Pandemic
Submitted by grigby1 on Fri, 03/17/2023 - 10:19am
critical infrastructure
pubcrawl
resilience
Resiliency
Safety
Computer crime
resource management
COVID-19
Pandemics
Childcare
Service Resilience
US Department of Homeland Security
biblio
Quantitative Risk Assessment of Threats on SCADA Systems Using Attack Countermeasure Tree
Submitted by grigby1 on Fri, 02/17/2023 - 5:13pm
critical infrastructure
security
pubcrawl
resilience
Resiliency
SCADA systems
cyber-physical systems
Compositionality
SCADA
power systems
security threat
security management
SCADA Systems Security
threat assessment
attack countermeasure tree
quantitative assessment
biblio
Security-Gateway for SCADA-Systems in Critical Infrastructures
Submitted by grigby1 on Fri, 02/17/2023 - 5:12pm
critical infrastructure
security
pubcrawl
resilience
Resiliency
performance evaluation
SCADA systems
certification
Compositionality
power system stability
Stability criteria
Current measurement
supervisory control and data acquisition
SCADA Systems Security
dependability
biblio
Identifying Security Requirements for Smart Grid Components: A Smart Grid Security Metric
Submitted by grigby1 on Fri, 01/13/2023 - 4:20pm
critical infrastructure
risk management
security
pubcrawl
Metrics
Smart Grids
Measurement
Security Metrics
power systems
risk assessment
Costs
metric
Securitisation Need
security level
SGAM
biblio
A DevSecOps-enabled Framework for Risk Management of Critical Infrastructures
Submitted by aekwall on Fri, 01/13/2023 - 3:57pm
Human Factors
software reliability
pubcrawl
Scalability
Metrics
Resiliency
risk management
software engineering
critical infrastructure
Economics
Hardware Robustness Safety critical systems
National security
Software and its engineering-Software creation and management-Software development process management Risk management
Security Risk Management
biblio
Internet of Things enabled Block Level Security Mechanism to Big Data Environment using Cipher Security Policies
Submitted by aekwall on Fri, 01/13/2023 - 3:53pm
Metrics
Fog Processing
Block Level Security
BIGDATA
security policies
Standards organizations
critical infrastructure
network security
taxonomy
Resiliency
Organizations
Scalability
pubcrawl
Internet of Things
privacy
IoT
blockchain
Human Factors
Big Data
biblio
Critical Infrastructure Protection and Supply Chain Risk Management
Submitted by grigby1 on Thu, 01/05/2023 - 2:27pm
critical infrastructure
risk management
pubcrawl
resilience
Resiliency
Conferences
Computer crime
security requirements
Cybersecurity
requirements engineering
supply chains
Ransomware
Critical Infrastructure Protection
supply chain risk management
supply chain security
1
2
3
4
5
6
7
8
9
next ›
last »