Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Assessment
biblio
The Most Common Control Deficiencies in CMMC non-compliant DoD contractors
Submitted by grigby1 on Fri, 06/09/2023 - 1:13pm
US Department of Defense
Cybersecurity Damage Assessment
Security Control Deficiency
NIST SP 800–171
Control Family
CMMC
US Department of Homeland Security
Assessment
Resiliency
pubcrawl
mitigation
Regulation
Accreditation
Data Security
NIST
Computational modeling
resilience
biblio
Toward Enabling Self-Protection in the Service Mesh of the Microservice Architecture
Submitted by grigby1 on Fri, 12/09/2022 - 6:16pm
microservices
Self-protection
Service Mesh
Microservice architectures
Autonomic Security
Observability
Assessment
distributed computing
threat model
computer architecture
Runtime
composability
Computational modeling
Resiliency
resilience
pubcrawl
security
biblio
Construction of information security risk assessment model based on static game
Submitted by grigby1 on Fri, 09/30/2022 - 10:29am
composability
static game
information security risk
threat assessment
Resiliency
Assessment
model
information theoretic security
uncertainty
Compositionality
Games
information security
Computational modeling
Scalability
Analytical models
resilience
collaboration
policy-based governance
Human Factors
Human behavior
pubcrawl
security
biblio
Research on Security Evaluation Technology of Intelligent Video Terminal
Submitted by grigby1 on Wed, 06/08/2022 - 1:55pm
Compositionality
Intelligent video terminal
Assessment
intelligent data
Resiliency
hospitals
Scalability
Transportation
testing
information security
Data Security
computer security
Production
data privacy
resilience
pubcrawl
Monitoring
security
biblio
Cybersecurity of healthcare IoT-based systems: Regulation and case-oriented assessment
Submitted by grigby1 on Thu, 04/21/2022 - 3:09pm
Advanced Security Assurance Case
ASAC
Assessment
assurance
CASE
Cloud Computing
Communication system security
computer security
Cybersecurity
Healthcare
Internet of Things
ISO standards
Medical services
requirement
biblio
Modelling Cyber-Risk in an Economic Perspective
Submitted by grigby1 on Mon, 04/18/2022 - 10:56am
machine learning
vulnerabilities
Training
Time series analysis
time-series
Security Risk Estimation
Scalability
Risk
resilience
pubcrawl
Metrics
Management
Adaptation models
Human Factors
econometrics
deep learning
Data mining
Cyber-security
bug-bounties
Biological system modeling
Assessment
Artificial Intelligence
Analytical models
biblio
Information Security Assessment On Court Tracking Information System: A Case Study from Mataram District Court
Submitted by aekwall on Wed, 04/13/2022 - 10:14am
security management
information security
pubcrawl
Resiliency
Government
ISO standards
Regulation
passwords
Assessment
CMMI
ISO/IEC 27001:2013
Mobile communication
SIPP
Damage Assessment
biblio
Assessment of Blockchain Technology Application in the Improvement of Pharmaceutical Industry
Submitted by grigby1 on Thu, 02/24/2022 - 12:21pm
Pharmaceutical
Assessment
blockchain
blockchain technology
data integrity
Human behavior
Industries
Medical services
patient safety
supply chain management
Privacy Policies
pubcrawl
Robustness
Safety
Saudi Arabia
Scalability
security
biblio
Leveraging Resilience Metrics to Support Security System Analysis
Submitted by aekwall on Fri, 02/04/2022 - 10:36am
Measurement
sensors
Data models
Perturbation methods
pubcrawl
Metrics
resilience
Sensor Systems
detection
security system
Adaptation models
Resiliency
Assessment
Geospatial analysis
multi-layer networks
biblio
Security Assessment for Zenbo Robot Using Drozer and mobSF Frameworks
Submitted by grigby1 on Thu, 02/03/2022 - 4:06pm
operating systems
robot operating systems security
Zenbo
forensic
Assessment
Human Factors
Systematics
Humanoid robots
android
Mobile handsets
tools
Linux
Resiliency
resilience
policy-based governance
pubcrawl
IoT
security
Computer hacking
collaboration
1
2
next ›
last »