Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security risk assessment
biblio
Security Risk Assessment of Server Hardware Architectures Using Graph Analysis
Submitted by grigby1 on Tue, 09/20/2022 - 1:01pm
computer architecture
Servers
pubcrawl
Metrics
Hardware
Hardware Security
Runtime
Measurement
security risk assessment
statistical analysis
Security Metrics
graph theory
Computing Theory
hardware security metrics
biblio
Security Risk Assessment Method of Edge Computing Container Based on Dynamic Game
Submitted by grigby1 on Fri, 08/26/2022 - 10:08am
Adaptation models
security
pubcrawl
Computational modeling
Containers
Games
Metrics
edge computing
reliability theory
security risk assessment
game theory
Nash Equilibrium
Computing Theory
container
feedback Nash equilibrium
biblio
Information Security Risk Assessment of Industrial Control System Based on Hybrid Genetic Algorithms
Submitted by aekwall on Thu, 06/09/2022 - 10:38am
information security
pubcrawl
Scalability
Resiliency
Industrial Control Systems
control systems
automation
industrial control
mechatronics
evidence theory
Hierarchy
hybrid genetic algorithm
industrial control system
measurement uncertainty
security risk assessment
scalable systems
biblio
CloudStrike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure
Submitted by grigby1 on Thu, 09/16/2021 - 10:51am
cloud computing security
Cloud Security
Data Breach
pubcrawl
resilience
Resiliency
Resilient Architectures
Resilient Security Architectures
security chaos engineering
security risk assessment
tools
biblio
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach
Submitted by aekwall on Tue, 04/27/2021 - 12:11pm
security
Software
Bayes methods
cyber-physical systems
Resiliency
pubcrawl
vulnerabilities
Topology
Scalability
Software algorithms
Systematics
security risk assessment
attack graphs
belief networks
Bayesian networks
Probabilistic Graphical Models
biblio
CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems
Submitted by grigby1 on Wed, 11/04/2020 - 12:35pm
reference CSB system
fault tolerant computing
malicious activities
malicious insider threats
Measurement
Metrics
metrics testing
multicloud strategy
open systems
proactive security risk analysis
pubcrawl
fault tolerance
risk analysis
risk management
Secure Configuration
security
security complexities
Security Metrics
security of data
security risk assessment
storage management
cloud security system
Attack Surfaces
auditing
BrokerMonkey
bucket policy misconfigurations
Cascading style sheets
chaos engineering failure injection strategies
Cloud Audit
cloud auditing schemes
Cloud Computing
API interoperability issues
cloud storage broker systems
cloud storage services
Cloud-Security
CloudRAID
Common Configuration Scoring System
Computational modeling
continuous snapshotting mechanism
CSB resource audits
CSBAuditor
biblio
SlingShot - Automated Threat Detection and Incident Response in Multi Cloud Storage Systems
Submitted by aekwall on Mon, 08/24/2020 - 11:40am
dynamic methods
Cloud-Security
Amazon S3
automated threat detection
cloud event log
cloud storage infrastructure
cloud storage security
cloud threat detection
contemporary cloud attacks
CSBAuditor
Amazon Web Services
dynamic snapshotting
Google cloud platform
Google cloud storage
Incident Response
incident response system
multicloud storage systems
recovery strategies
SlingShot
static methods
Correlation
Cloud Computing
security
real-time systems
Resiliency
pubcrawl
composability
Google
web services
cyber-attacks
security of data
Automated Response Actions
security events
security issues
storage management
chaos
Guidelines
security risk assessment
threat detection
biblio
Security Chaos Engineering for Cloud Services: Work In Progress
Submitted by aekwall on Mon, 07/27/2020 - 11:14am
cloud computing security
traditional security paradigms
security chaos engineering
Resilient Architectures
nonsecurity failures
Human Errors
CloudStrike
Cloud-Security
cloud security system
intrusion tolerance
security models
security risk assessment
cloud infrastructure
Intrusion Detection
chaos
software fault tolerance
Fault tolerant systems
cloud services
security breaches
fault tolerance
testing
composability
pubcrawl
Resiliency
Cloud Computing
security of data
biblio
A Security Evaluation Model Based on Fuzzy Hierarchy Analysis for Industrial Cyber-Physical Control Systems
Submitted by grigby1 on Fri, 07/24/2020 - 11:59am
Analytical models
Control Theory
security risk assessment
security evaluation model
information security research
information of Industrial cyber-physical control systems
industrial cyber-physical control systems
industrial control system safety risk evaluation
industrial control system risk management decision
fuzzy hierarchy analysis
fuzzy evaluation
fuzzy analytical hierarchy process
security
risk management
industrial control
Safety
cyber-physical systems
fuzzy set theory
pubcrawl
Security Evaluation
security threats
control systems
risk analysis
computer network security
biblio
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications
Submitted by grigby1 on Thu, 06/04/2020 - 10:47am
SPS threats
Safety
safety risk assessment
security
security risk assessment
Servers
social aspects of automation
Social Virtual Reality
Solid modeling
risk management
three-dimensional immersive computer experience
trees (mathematics)
user experience
virtual reality
virtual reality learning environment
VR technology
VRLE system
vSocial VRLE
immersive systems
attack tree
attack tree formalism
composability
computer based training
cyber physical systems
data privacy
educational user experience
Human Factors
adhoc attack tree
IoT Application Testbed
privacy
Privacy Control
privacy-preservation
pubcrawl
real-time systems
resilience
Resiliency
1
2
next ›
last »