Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
risk management
biblio
Cloud, Big Data IoT: Risk Management
Submitted by grigby1 on Fri, 08/28/2020 - 3:33pm
Metrics
big data security in the cloud
digital devices communications
competitive business environment
business quality improvement
business risks
interconnected devices
Distributed databases
Scalability
resilience
Internet of Things
Big Data
Resiliency
pubcrawl
IoT
business data processing
security
risk management
Cloud Computing
biblio
Adaptive and Intelligible Prioritization for Network Security Incidents
Submitted by aekwall on Mon, 08/24/2020 - 12:41pm
risk management
static calculations
prioritization model management
network security incidents
incident prioritization
adaptive learning
adaptive incident prioritization
Communication networks
Automated Response Actions
Anomaly Detection
automation
security of data
tools
composability
pubcrawl
Resiliency
network security
cyber security
Adaptation models
Task Analysis
security
biblio
Risk Assessment of Industrial Internet System By Using Game-Attack Graphs
Submitted by aekwall on Mon, 08/17/2020 - 11:17am
search engines
search engine keyword segment matching method
scan components
open services
nondestructive asset profiling
industrial internet system
game-attack graph-based risk assessment model
attribute attack graph
attack rule base
Attack Path
asset threat list
attack graphs
attack graph
Nash Equilibrium
Predictive Metrics
security of data
industrial control
risk analysis
probability
communication protocols
risk assessment
risk management
internet
graph theory
composability
pubcrawl
Resiliency
game theory
Protocols
security
biblio
Intellectual Property Protection of 3D Print Supply Chain with Blockchain Technology
Submitted by grigby1 on Thu, 07/30/2020 - 2:05pm
Intellectual Property Protection
three-dimensional printing
supply chains
supply chain management
spatially distributed
software area
safety-critical products
RFID
printing industry
licensing models
License Management
digital media
additive manufacturing
3D print supply chain
ip protection
copyright
risk management
Labeling
Three-dimensional displays
Plagiarism
Metrics
Law
composability
production engineering computing
Biological system modeling
blockchain technology
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
biblio
A Security Evaluation Model Based on Fuzzy Hierarchy Analysis for Industrial Cyber-Physical Control Systems
Submitted by grigby1 on Fri, 07/24/2020 - 12:59pm
Analytical models
Control Theory
security risk assessment
security evaluation model
information security research
information of Industrial cyber-physical control systems
industrial cyber-physical control systems
industrial control system safety risk evaluation
industrial control system risk management decision
fuzzy hierarchy analysis
fuzzy evaluation
fuzzy analytical hierarchy process
security
risk management
industrial control
Safety
cyber-physical systems
fuzzy set theory
pubcrawl
Security Evaluation
security threats
control systems
risk analysis
computer network security
biblio
Privacy Token Technique for Protecting User’s Attributes in a Federated Identity Management System for the Cloud Environment
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
cloud environment
user privacy in the cloud
user attributes protection
SPs
Services and user’s privacy
pseudonymous technique
pseudoattributes values
privacy token technique
Privacy Token
personal identifiable information
Java programming language
federated identity management system
CloudAnalyst simulation
attributes privacy protection
Cloud Computing
privacy risks
Scalability
cloud
Java
service providers
risk management
Data protection
Metrics
privacy
pubcrawl
Resiliency
authorisation
biblio
A Review on Self Destructing Data:Solution for Privacy Risks in OSNs
Submitted by grigby1 on Fri, 07/10/2020 - 11:41am
privacy
social networking (online)
Servers
self destructing data
security risks
security of data
security
Scalability
risk management
pubcrawl
privacy violations
privacy settings
privacy risks
Cryptography
OSN user
OSN server
OSN providers
online social networks
online social network users
internet
file servers
Facebook
delays
data privacy
data deletion
biblio
Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
pubcrawl
tactical risk
Software Vulnerability
software fault tolerance
Servers
security of data
security
Safety
risk management
risk analysis
resource management
Resiliency
resilience
random system faults
CPS resilience
optimal cyber defense remediation
operational technology
Operational Resilience
operational impact assessment
information technology
graph theory
fault graph-based model
Erbium
data-driven attack graph
Damage Assessment
cyber-physical systems
cyber threats
cyber physical systems
biblio
Multilevel Fuzzy Logic-Based Approach for Critical Energy Infrastructure’s Cyber Resilience Assessment
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
logic linguistic models
vital physical system
Ukrainian CEI
security of data
Safety
risk management
Resiliency
resilience capacities
resilience assurance
resilience
pubcrawl
multilevel fuzzy logic models
logic-linguistic models
Accidents
Linguistics
fuzzy set theory
fuzzy logic-based approach
Fuzzy logic
external hostile influences
Damage Assessment
cyber resilience
cyber incidents
critical infrastructures
critical energy infrastructure
Computer crime
CEI cyber resilience assessment
biblio
A Study of Security Modeling Techniques for Smart Systems
Submitted by aekwall on Mon, 07/06/2020 - 10:18am
critical security systems
Damage Assessment
Threat Modeling
system services
Smartness
Smart Systems
Security Modeling Techniques
Security modeling
secure smart system development life cycle
fault trees
security of data
system resources
Unified modeling language
Stochastic processes
risk management
Analytical models
pubcrawl
Resiliency
Software
security
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »