Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IT security
biblio
Anomaly Detection by Recombining Gated Unsupervised Experts
Submitted by grigby1 on Fri, 07/21/2023 - 1:29pm
resilience
mixture-of-experts
IT security
expert systems
Knowledge engineering
Fuses
Training data
Scalability
Analytical models
Resiliency
Logic gates
Human behavior
pubcrawl
Neural networks
Anomaly Detection
Unsupervised Learning
Data mining
security
deep learning
biblio
Business Continuity & Disaster Recovery A simulation game for holistic cyber security education
Submitted by grigby1 on Fri, 06/09/2023 - 2:00pm
composability
Simulation Game
cyber security education
engineering education
policy governance
Human Factors
business continuity
cybersecurity education
resilience
Games
security
Companies
Computer crime
IT security
Scalability
Conferences
Resiliency
Human behavior
pubcrawl
biblio
Information security risk assessment based on decomposition probability via Bayesian Network
Submitted by aekwall on Tue, 04/27/2021 - 1:10pm
Measurement
web security
Urban areas
security
risk management
risk assessment
Resiliency
pubcrawl
probability of cyberattacks
belief networks
IT security
Information systems
information security
Cybersecurity
cyberattack
cyber-physical systems
computer security
biblio
How to stop crashing more than twice: A Clean-Slate Governance Approach to IT Security
Submitted by grigby1 on Tue, 03/16/2021 - 2:09pm
IT industry
security of data
Security certification
security
RNA
Resiliency
resilience
pubcrawl
privacy
policy-based approach
Policy
organisational aspects
Metrics
Licenses
IT security incidents
IT security
certification
ISO standards
integrated circuits
Human behavior
Governance
GDPR
Europe
Equifax
DP management
DP industry
corporate social responsibility
Conferences
collaboration
clean-slate governance approach
clean slate
biblio
On the Relevance of IT Security in TDL
Submitted by aekwall on Mon, 09/14/2020 - 12:32pm
Fixed Message Format
VMF security
Variable Message Format
TDL
tactical data links
standard Internet technology
software development patterns
scientific computing
Link 16
Link 11
IT security standards
IT security perspective
security of data
computer science
commercial of the shelf systems
command and control systems
Compositionality
IT security
internet
computational intelligence
composability
pubcrawl
Cryptography
biblio
Industrial Control Systems (Ics) Security in Power Transmission Network
Submitted by grigby1 on Tue, 01/21/2020 - 12:15pm
Organizations
supervisory control and data acquisition
Scalability
SCADA
Resiliency
resilience
pubcrawl
power transmission network
power transmission control
power system security
power stations
power grids
power distribution grids
power distribution control
Industrial Control Systems Anomaly Detection
IT security
integrated circuits
industrials plants
Industrial Control Systems
industrial control system security
industrial control
ICS security
ICs
Firewalls (computing)
firewall
Cybersecurity
control systems
biblio
BAP: A Batch and Auditable Privacy Preservation Scheme for Demand-Response in Smart Grids
Submitted by aekwall on Mon, 01/20/2020 - 11:45am
Resiliency
pubcrawl
IT security
Smart Grids
Predictive Metrics
Compositionality
audit
demand response
privacy preservation
encryption audits
biblio
Cyber-Physical IT Assessment Tool and Vulnerability Assessment for Semiconductor Companies
Submitted by aekwall on Mon, 02/25/2019 - 11:43am
cyber-attacks
cyber-physical security
Cybersecurity
Internet of Things
IT security
IT security vulnerabilities
Metrics
pubcrawl
Resiliency
Supply Chain Risk Assesment
biblio
Assuming a State of Compromise: A Best Practise Approach for SMEs on Incident Response Management
Submitted by BrandonB on Wed, 05/06/2015 - 10:39am
best practices
Companies
Computer crime
Cybercrime
economic feasibility
enterprise IT security experts
Forensics
Incident Response
incident response management
IT security
malware
remediation
small and medium sized enterprises
small-to-medium enterprises
SME