Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network security risk assessment
biblio
NiNSRAPM: An Ensemble Learning Based Non-intrusive Network Security Risk Assessment Prediction Model
Submitted by aekwall on Fri, 01/13/2023 - 2:58pm
Human Factors
authorization
Law
pubcrawl
Scalability
Metrics
Resiliency
machine learning
Insurance
network security
Companies
Costs
cybersecurity insurance
Ensemble Machine Learning
network security risk assessment
Security Risk Management
biblio
Network Security Risk Assessment Using Intelligent Agents
Submitted by aekwall on Mon, 11/23/2020 - 10:22am
network connectivity
Data Security
attack graphs
automated intelligent systems
decision-making approach
FCMs
Fuzzy cognitive maps
governmental rules
interconnected network analysis
large networks analysis
attack graph
network graphical representation
network security engineers
network security risk assessment
organisational rules
Risk Prevention
security risk analysis
Intelligent Data Security
Intelligent Data and Security
Decision Making
Scalability
security
Task Analysis
Resiliency
pubcrawl
graph theory
multi-agent systems
tools
computer network security
robots
Communication networks
security breaches
risk analysis
computer networks
Compositionality
multiagent system
data communication
biblio
An Attack Vector Evaluation Method for Smart City Security Protection
Submitted by grigby1 on Mon, 02/17/2020 - 4:08pm
pubcrawl
weakness
vulnerability assessment
Vulnerability
Software
smart city security protection
smart cities
simulation
security weaknesses
security of data
security
risk management
Resiliency
resilience
quantitative evaluation method
Analytical models
policy-based governance
network security risk assessment
Metrics
Human behavior
formal representation
edge computing
depend conditions
defense factors
critical information infrastructure
Conferences
Big Data
Attack vectors
attack vector evaluation method
attack vector