Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
risk management
biblio
A New Evaluation Model for Information Security Risk Management of SCADA Systems
Submitted by aekwall on Mon, 03/16/2020 - 10:28am
Cyber-physical attacks
Vague Set Theory
vague environment
uncertain environment
structured method
semiquantitative high level analysis
secure SCADA failure modes
RPN
physical layers
Pattern recognition
new evaluation model
FMEA inherent problems
design review
cyber layers
critical information infrastructure
Information Security Risk Management
Safety
Compositionality
SCADA Systems Security
SCADA system
Information systems
process control
failure analysis
risk management
pubcrawl
Human behavior
Resiliency
SCADA systems
SCADA
security
Monitoring
security of data
biblio
Risk Assessment Approach to Secure Northbound Interface of SDN Networks
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
risk assessment
traffic demand requests
telecommunication traffic
software defined networking
Security Risk Estimation
security
secure Northbound interface
SDN network administrators
SDN
Scalability
risk management
risk assessment approach
accurate risk estimation
Resiliency
RAMSES
pubcrawl
Northbound-API
network optimization tool
network cost
Metrics
Human Factors
computer network security
computer network management
application program interfaces
biblio
Privacy Risk Assessment for Data Subject-Aware Threat Modeling
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
data subject-aware threat modeling
Privacy Risk
privacy by design
Monte Carlo methods
GDPR
Context modeling
data flow diagram system models
data protection by design
data subject-aware privacy risk assessment model
Human Factors
General Data Protection Regulation
Monte Carlo simulations
privacy risk assessment
privacy threat modeling activities
risk estimation approach
threat modeling tool prototype
Security Risk Estimation
Threat Modeling
risk analysis
data privacy
risk assessment
risk management
Analytical models
Data protection
data flow analysis
Metrics
privacy
pubcrawl
Resiliency
Data models
security
Scalability
security of data
biblio
Quantile based risk measures in cyber security
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
data breach information
Security Risk Estimation
value at risk estimation
Value at Risk
tail value at risk
Risk measures
quantile based risk measures
Privacy Rights Clearinghouse
pricing cyber insurance contracts
insurance data processing
insurance companies
financial sector
security of data
cyber value at risk
cyber risk
Chronology of data breaches
Human Factors
risk management
Metrics
pubcrawl
Resiliency
cyber security
data privacy
Scalability
biblio
The Actual Problems of IT-Security Process Assurance
Submitted by grigby1 on Mon, 03/02/2020 - 1:35pm
organisational aspects
Vulnerability
System recovery
Standard
security of data
security
risk management
Resiliency
resilience
pubcrawl
Production
asset
IT-security process assurance
IT-security management system
ISO standards
integrated management systems
Integrated Management System
information management
IEC standards
company business processes
Companies
business process
biblio
An Attack Vector Evaluation Method for Smart City Security Protection
Submitted by grigby1 on Mon, 02/17/2020 - 5:08pm
pubcrawl
weakness
vulnerability assessment
Vulnerability
Software
smart city security protection
smart cities
simulation
security weaknesses
security of data
security
risk management
Resiliency
resilience
quantitative evaluation method
Analytical models
policy-based governance
network security risk assessment
Metrics
Human behavior
formal representation
edge computing
depend conditions
defense factors
critical information infrastructure
Conferences
Big Data
Attack vectors
attack vector evaluation method
attack vector
biblio
Early Hybrid Safety and Security Risk Assessment Based on Interdisciplinary Dependency Models
Submitted by grigby1 on Mon, 02/17/2020 - 5:07pm
security risks
risk analysis
risk management
Safety
safety assessment
security
security assessment
security design weaknesses
security risk assessment
Resiliency
security weaknesses
social reasons
Software
system complexity
system operation
tools
Unified modeling language
complex critical infrastructures
resilience
pubcrawl
policy-based governance
modeling
Model driven engineering
Metrics
interdisciplinary interactions
interdisciplinary dependency models
hybrid safety
Human behavior
fault trees
environmental reasons
economic reasons
Design Process
critical infrastructures
biblio
Security Risk-Aware Resource Provisioning Scheme for Cloud Computing Infrastructures
Submitted by grigby1 on Mon, 02/17/2020 - 5:04pm
genetic algorithm
security scalability
security risk
security of data
Security Metrics
Scalability
risk management
resource provisioning
quantitative security risk evaluation approach
pubcrawl
InterCloud
Artificial Bee Colony
evolutionary computation
customers security requirements
Compositionality
cloud service providers
cloud security risk-aware resource provisioning scheme
cloud data centers
cloud computing technology
cloud computing infrastructure
cloud computing environment
Cloud Computing
biblio
Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements
Submitted by grigby1 on Mon, 02/17/2020 - 5:04pm
risk analysis
graph theory
managed assets
Organizations
potential hacking paths
prioritizes surgical requirements
prioritizing Agile Security requirements
process control
pubcrawl
Remediation Requirements
requirements backlog
Requirements Prioritization
graph analytics
risk management
risk-reduction security requirements
Scalability
security
Security Operation Center
security requirements
security scalability
software prototyping
Standards organizations
virtual adversary attack paths
business risks
Agile Security models different types
agile style
attack graph
Attack Path
attack surface
attack surface reduction
Big Data
Big Data Analytics
business data processing
business process targets
business processes
Agile Security
cardinal assets
complex big data graph
Compositionality
Computer crime
constant prioritization
critical assets identification
cyber attack graphs
Cyber Digital Twin
cyber-attacks
data analysis
biblio
Risk and avoidance strategy for blocking mechanism of SDN-based security service
Submitted by aekwall on Mon, 02/17/2020 - 2:28pm
Monitoring
Switches
software-defined network
software defined networking
Security Risk Management
security
SDN-based Security Services
SDN-based security service
SDN security
SDN attack
Scalability
risk management
risk analysis
Resiliency
pubcrawl
Protocols
Dynamic Networks and Security
Metrics
malicious host
IP networks
IP forging
IEC standards
forged packets
forged IP address
dynamic network technology
data planes
cost-effective risk avoidance strategy
computer network security
blocking mechanism
attack scenario
composability
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »