Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
risk management
biblio
Decision Support System for Risk Assessment Using Fuzzy Inference in Supply Chain Big Data
Submitted by grigby1 on Mon, 01/27/2020 - 11:34am
risk assessment
Metrics
organisation Big Data collection
organisational aspects
policy-based governance
production engineering computing
pubcrawl
resilience
Resiliency
mamdani fuzzy inference
risk Identification
risk management
Scalability
supply chain Big Data
supply chain management
supply chain risk assessment
supply chains
Fuzzy Inference DSS mechanism
Big Data
collaboration
composability
Decision Making
decision support system
Decision support systems
emerging association patterns
FIDSS mechanism
Analytical models
Fuzzy logic
fuzzy reasoning
fuzzy set theory
Fuzzy sets
Human behavior
Human Factors
inference mechanisms
biblio
Assessing the Security Risks of Multicloud SaaS Applications: A Real-World Case Study
Submitted by grigby1 on Mon, 01/27/2020 - 11:33am
Scalability
privacy concerns
pubcrawl
Quantitative risk assessment
resilience
Resiliency
risk assessments
risk management
SaaS
policy-based governance
security
security risks
Software as a service
Supply Chain
supply chain risk assessment
supply chain-inclusive risk assessment model
supply chains
transparency
composability
case study
cloud
Cloud Computing
cloud computing services
cloud risks
cloud service providers
cloud supply chain cyber risk assessment model
collaboration
Analytical models
computing industry
CSCCRA model
data privacy
dynamic supply chain
Human behavior
Human Factors
Metrics
multicloud SaaS application
biblio
Understanding Security Requirements for Industrial Control System Supply Chains
Submitted by grigby1 on Tue, 01/21/2020 - 11:16am
Scalability
organizational aspects
Organizations
pubcrawl
resilience
Resiliency
risk assessment
risk decision-making
risk management
organisational aspects
security industrial control system supply chains
security requirements
Standards organizations
stuxnet attack
supply chain management
supply chain risk assessment
supply chains
supply chain security
nuclear facility
Natanz city
malware
Iran
integrated circuits
Industrial Control Systems Anomaly Detection
Industrial Control Systems
industrial control
human issues
Decision Making
cyber-physical systems
cyber-physical infrastructures
control system security
control engineering computing
Computer crime
biblio
SOA Approach - Identity and Access Management for the Risk Management Platform
Submitted by grigby1 on Tue, 01/21/2020 - 10:35am
multilayered approach
User Management
taxes
tariffs
SOA approach
SOA
service-oriented architecture
security
Scalability
risk management system
Risk Management platform
risk management
resilience
pubcrawl
Protocols
access management
international trade
information exchange
imports
Identity management
Human behavior
goods transit
goods dispatch data processing
export
duties
decoupled microservices
customs administrations
checking prohibitions
authorization
authentication
biblio
A Symptomatic Framework to Predict the Risk of Insider Threats
Submitted by grigby1 on Tue, 01/21/2020 - 10:23am
Insider Threat Scoring Engine (ITSE)
collaboration
Critical assets
critical infrastructure
critical infrastructure organisation
critical infrastructures
Engines
Human behavior
information security
information security threats
insider threat
insider threat events
insider threat framework for Namibia critical infrastructure organization
tools
Interviews
ITFNACIO
Metrics
policy-based governance
pubcrawl
resilience
Resiliency
risk management
security of data
symptomatic analysis
Symptomatic Analysis (SA)
symptomatic insider threat risk assessment framework
biblio
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Submitted by aekwall on Mon, 01/20/2020 - 11:05am
network reachability
attack tree
client-side attack
enterprise networks risk measurement
host based vulnerability scan
intrusion prevention system
modeling modern network attack
NetSPA attack graph system
network defense
attack graph
personal firewall
point-to-point reachability algorithm
protection
proxy firewall
reverse reachability computation
SCAP
zero-day exploit
Zero Day Attacks and Defense
risk management
authorisation
Resiliency
pubcrawl
composability
graph theory
Computational modeling
reachability analysis
Analytical models
computer network security
computer security
military computing
Laboratories
computer networks
Predictive Metrics
Computer worms
Application software
biblio
A Model-Based Time-to-Compromise Estimator to Assess the Security Posture of Vulnerable Networks
Submitted by grigby1 on Wed, 10/23/2019 - 11:36am
patch management
uncertainty
Security Risk Management
Security Risk Estimation
security
Scalability
risk management
risk assessment
Resiliency
resilience
pubcrawl
Security Metrics
NIST
Monte Carlo simulation
Metrics
Measurement
Human Factors
Human behavior
estimation
computer science
Comparative security metric
biblio
The $\beta$-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation
Submitted by grigby1 on Wed, 10/23/2019 - 11:36am
Risk-Metric
national CERT
original TTC
practical cyber security risk estimation
pubcrawl
resilience
Resiliency
risk management
Risk-Estimation
Metrics
Scalability
security of data
Security Risk Estimation
Security-Metric
Threat Landscape
time-to-compromise metric
vulnerability database
β-distribution
estimation
complex systems
Complexity theory
computer science
continuous attacker skill
CVSS vectors
cyber threat intelligence
Cyber-security
cybersecurity metrics
complex system modeling
Human behavior
Human Factors
individual systems
IT-security
Large-scale systems
mathematical shortcomings
Measurement
methodological shortcomings
biblio
Policy-Based Security Modelling and Enforcement Approach for Emerging Embedded Architectures
Submitted by aekwall on Tue, 10/22/2019 - 8:54am
DREAD risk assessment model
Security Policies Analysis
threat modelling
STRIDE threat modelling
STRIDE
Security Modelling
Secure by design
policy-based security modelling
policy-based security enforcement
policy update
OEMs
Guidelines
embedded security
embedded architectures
security of data
device life-cycle
connected vehicles
configurable policy engine
Biological system modeling
application threat analysis
Policy
risk management
policy-based governance
pubcrawl
embedded systems
Software
Hardware
Access Control
biblio
A Threat Modeling Approach for Cloud Storage Brokerage and File Sharing Systems
Submitted by grigby1 on Thu, 09/26/2019 - 9:42am
security challenges
Measurement
Metrics
Peer-to-peer computing
pubcrawl
resilience
Resiliency
risk management
Secure Configuration
Secure File Sharing
security
Mathematical model
Security Metrics
security of data
security risk assessment
storage management
Threat Modeling
threat modeling schema
threat models
tools
trees (mathematics)
Common Configuration Scoring System
Cloud Computing
Cloud Security
cloud stakeholders
Cloud storage brokerage systems
Cloud Storage Brokers
cloud storage complexities
Cloud storage Enumeration Attack
Cloud Storage Exploitation Attack
cloud storage systems
Cloud-Security
attack tree
composability
comprehensive risk assessments
Computational modeling
conflicting security policies
Data models
file sharing systems
Human behavior
Human Factors
identified security risks
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »