Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
risk management
biblio
Investigating Attack Propagation in a SoS via a Service Decomposition
Submitted by grigby1 on Fri, 07/03/2020 - 4:55pm
Safety
systems of systems
system of systems
system decomposition
SoS structure
SoS risk assessment
SoS development life cycle
SoS design
service-guarantees
service levels
service decomposition
Service
sensors
security of data
security
attack propagation
risk management
pubcrawl
Metrics
malicious adversaries
independent systems
decomposition
cyber physical systems
connected systems
Compositionality
Complexity theory
communication as a service
autonomous vehicles
autonomous quarry
attack propagation problem
biblio
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications
Submitted by grigby1 on Thu, 06/04/2020 - 11:47am
SPS threats
Safety
safety risk assessment
security
security risk assessment
Servers
social aspects of automation
Social Virtual Reality
Solid modeling
risk management
three-dimensional immersive computer experience
trees (mathematics)
user experience
virtual reality
virtual reality learning environment
VR technology
VRLE system
vSocial VRLE
immersive systems
attack tree
attack tree formalism
composability
computer based training
cyber physical systems
data privacy
educational user experience
Human Factors
adhoc attack tree
IoT Application Testbed
privacy
Privacy Control
privacy-preservation
pubcrawl
real-time systems
resilience
Resiliency
biblio
Information Network Risk Assessment Based on AHP and Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:54pm
Metrics
Neural Network Security
system risk value
security risk assessment
risk judgment matrix consistency
neural network technology
neural network
information network security risk assessment application
information network risk assessment
automatic assessment
asset risk value
analytic hierarchy process
AHP method
AHP
information network
risk analysis
security of data
neural nets
information networks
Communication networks
Object recognition
matrix algebra
Resiliency
resilience
policy-based governance
pubcrawl
Neural networks
security
risk management
collaboration
Training
biblio
Design of Electronic Medical Record Security Policy in Hospital Management Information System (SIMRS) in XYZ Hospital
Submitted by aekwall on Mon, 04/13/2020 - 10:14am
hospitals
Triangle Policy Analysis
SIMRS
Security Control
records management
privacy control mapping
medical record management system
hospital management information system
EMR management
EMR
electronic medical record security policy
security of data
medical computing
health care
security policies
NIST
risk management
policy-based governance
pubcrawl
electronic health records
data privacy
biblio
Securing the Industrial Internet of Things for Critical Infrastructure (IIoT-CI)
Submitted by aekwall on Mon, 04/13/2020 - 10:07am
Local area networks
Security by Default
Software Defined Perimeter
SD-WAN
SD-Node
machine-to-machine communications
machine-to-machine communication
M2M devices
industrial Internet of Things for Critical Infrastructure
industrial application
IIoT-CI
wide area networks
Software Defined Networks
computer network security
SDN
risk management
pubcrawl
Resiliency
critical infrastructure
software defined networking
Software
Protocols
security
Internet of Things
Scalability
ddos mitigation
biblio
Power of Communication Behind Extreme Cybersecurity Incidents
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
Phishing
surrounding threats
security of data
Scalability
risk mitigations
risk management
risk analysis
Resiliency
resilience
pubcrawl
Protocols
Computational modeling
Pervasive Computing Security
Metrics
internet
Human Factors
Human behavior
extreme cybersecurity incidents
Electronic mail
Cyberspace
Cybersecurity
biblio
The Method of Assessing the Level of Compliance of Divisions of the Complex Network for the Corporate Information Security Policy Indicators
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
Information systems
the ratio of Pareto
the Hamming distance
the accounts of the Board
Standards organizations
security of data
risk minimization
risk management
ranking of the values of indicators
pubcrawl
policy-based governance
Policy Based Governance
Organizations
maximin and minimax procedures
collaboration
Information services
information security
Games
decision-making
Decision Making
criteria
corporate information system
corporate information security policy requirements
corporate information security policy indicators
compliance level assessment
complex networks
complex network
comparative assessment
biblio
Incentive Contract for Cybersecurity Information Sharing Considering Monitoring Signals
Submitted by grigby1 on Wed, 03/18/2020 - 11:51am
Incentive Model
Science of Security
Human behavior
resilience
Resiliency
Metrics
Policy-Governed Secure Collaboration
collaboration
composability
pubcrawl
Moral Hazard
monitoring signals
Insurance
information sharing output
information management
security of data
Incentive mechanism
incentive contract
ethics
Environment monitoring
cybersecurity information sharing
cybersecurity information haring
cyber risk transfer
Cyber Insurance
contracts
computer security
Scalability
risk management
Monitoring
biblio
Principles of Physical and Information Model Integration for Cybersecurity Provision to a Nuclear Power Plant
Submitted by grigby1 on Wed, 03/18/2020 - 11:50am
pubcrawl
Metrics
modelling
nuclear engineering computing
nuclear power plant
nuclear power stations
Numerical models
physical models
Policy-Governed Secure Collaboration
Mathematical model
resilience
Resiliency
risk management
Scalability
Science of Security
security of data
simulations
cybersecurity provision
collaboration
complex technical objects
composability
Computational modeling
computer security
cyber threats
Cybersecurity
cybersecurity problems
Adaptation models
cybersecurity risk assessment
Data models
Human behavior
hybrid model
information model integration
information properties
instrumentation and control system
biblio
Attacking IEC-60870-5-104 SCADA Systems
Submitted by aekwall on Mon, 03/16/2020 - 10:29am
IEC 60870-5-104 protocol
SCADA Systems Security
Compositionality
Internet of Things devices
AlienVault's risk assessment
coloured Petri Net
electrical grid
European energy sector
IEC 60870 5 104
Petri nets
IEC-60870-5-104 SCADA systems
information and communications technology services
OSSIM
Power supplies
SCADA Security
SCADA threat model
SG
threat modelling
pubcrawl
security of data
Access Control
Internet of Things
Protocols
SCADA systems
supervisory control and data acquisition systems
Resiliency
Human behavior
cyberattack
risk management
smart power grids
Cyber Attacks
IEC standards
power engineering computing
power system security
Smart Grid
process control
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »