Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
risk management
biblio
A Cooperative Game for Online Cloud Federation Formation Based on Security Risk Assessment
Submitted by grigby1 on Fri, 10/26/2018 - 4:05pm
Games
undesirable CSPs
security risk levels
security risk avoidance
security risk assessment
security of data
security
Scalability
risk management
quality of service
pubcrawl
online Cloud federation formation
Metrics
insecure CSPs
Human Factors
hedonic coalitional game
Cloud Computing
game theory
game theoretic security
federation formation algorithm
federated Cloud service
cooperative game
Computational modeling
coalitional game
cloud service providers
Cloud Security
Cloud federations
Cloud federation formation process
Cloud federation formation model
cloud federation
cloud environments
biblio
Security risk assessment of the PeopleBot mobile robot research platform
Submitted by grigby1 on Wed, 09/12/2018 - 10:13am
Resiliency
WiFi
ubiquitous computing
Service robots
security threats
security risk assessment
security of data
security access
security
robots
robotic systems
Robot sensing systems
risk management
collision avoidance
resilience
remote accessing
remote access service
pubcrawl
PeopleBot mobile robot research platform
mobile robots
mobile robot platform
internet
Ethernet
Damage Assessment
critical missions
control
biblio
Security management of cyber physical control systems using NIST SP 800-82r2
Submitted by grigby1 on Wed, 09/12/2018 - 10:13am
security management
NIST
NIST Guide
NIST SP 800-82r2
pubcrawl
resilience
Resiliency
risk assessment
risk management
security
Industrial Control Systems
security measures
security of data
security requirements
stakeholder-aware risk evaluation method
Stakeholders
standards
threats
vulnerabilities
Databases
critical infrastructure system
critical infrastructures
CSES method
cyber physical control systems
cyber-physical systems
Cybersecurity
Cyberspace
Cyberspace Security Econometrics System
Damage Assessment
control systems
dependability
economics-based risk evaluation method
electric utility
Electricity supply industry
gas industry
gas utility
ICS security
industrial control
biblio
Realistic measurement protection schemes against false data injection attacks on state estimators
Submitted by grigby1 on Wed, 09/05/2018 - 9:42am
maximum total ROI
FDIA
power system state estimation
Computing Theory
alternative measurement protection schemes
cost-benefit analysis
false data injection attacks
ignored cost-benefit issue
imminent cyber-physical security issue
state estimation
metric return
realistic measurement protection schemes
realistic MPS
return on investment
state estimators
Steiner tree problem
Steiner trees
Security Metrics
Metrics
Indexes
optimization
optimisation
power engineering computing
Smart Grids
power system security
trees (mathematics)
security of data
cyber-physical security
risk management
performance evaluation
pubcrawl
false data injection attack
graph theory
biblio
Shortfall-Based Optimal Security Provisioning for Internet of Things
Submitted by grigby1 on Thu, 06/07/2018 - 2:08pm
Resiliency
telecommunication network topology
Stochastic Computing Security
Stochastic computing
stochastic allocation
shortfall-based optimal security provisioning
security resource allocation plan
security infrastructure
security
Scalability
risk minimization
risk measure
risk management
resource management
resource allocation
computer network security
resilience
pubcrawl
Pareto optimization
optimization problem
optimization
optimisation
network security
Investment
Internet-of-Things scenarios
Internet of Things
Electronic mail
Economics
continuous topology changes
biblio
Security Challenges and Risk Evaluation Framework for Industrial Wireless Sensor Networks
Submitted by grigby1 on Wed, 05/30/2018 - 3:01pm
Peer-to-peer computing
wireless sensor networks
Wireless communication
smart factories
security weaknesses
security challenges
security
risk management
risk evaluation framework
risk evaluation
Resiliency
resilience
pubcrawl
Production facilities
production equipment
policy-based governance
collaboration
Monitoring
Metrics
IWSN
intelligent manufacturing
information system
Industry 4.0
Industries
industrial wireless sensor networks
Industrial Control Systems
Human Factors
Human behavior
environmental monitoring
condition parameter monitoring
condition monitoring
biblio
Research of Security Risk in Electric Power Information Network
Submitted by grigby1 on Wed, 05/30/2018 - 3:01pm
power engineering computing
synthesis evaluation model
styling
security weaknesses
security risk
security of data
Security Evaluation
risk management
risk assess
Resiliency
resilience
pubcrawl
Production
power systems
power system management
collaboration
policy-based governance
password
operating systems
network security
multilevel fuzzy comprehensive judgment
Metrics
Human Factors
Human behavior
fuzzy set theory
fuzzy judgment
evaluation index system
electric power information network
Communication networks
biblio
Assessing Software Supply Chain Risk Using Public Data
Submitted by grigby1 on Tue, 05/01/2018 - 10:35am
software supply chain risk assessment
Robustness
safety-critical software
Scalability
secure networking library
security
security of data
sigmoid cumulative vulnerability discovery function
Software
risk management
software vulnerability discovery
supply chain management
supply chain risk
supply chain security
supply chains
temporary plateau feature
tools
vulnerability discovery
open source project
AML
commercial government organizations
cumulative vulnerability discovery plot
cybersecurity risk
Databases
Human behavior
national vulnerability database
NVD
Alhazmi-Malaiya Logistic model
open version control data
OpenSSL
Predictive models
pubcrawl
public data
resilience
Resiliency
biblio
A generic framework for information security policy development
Submitted by grigby1 on Mon, 04/30/2018 - 2:26pm
Law
security policy development
security policy content
security policies
security of data
risk management
replicated policy
pubcrawl
Organizations
maintenance engineering
education
information security policy development process
information security policy
information security policies
information security
improper development process
higher education institutions
generic framework
further education
biblio
Methodology (N2FMEA) for the detection of risks associated with the components of an underwater system
Submitted by K_Hooper on Wed, 04/04/2018 - 8:51am
n2 approaches
Underwater vehicles
Underwater Networks
Telephone sets
security
Scalability
risk management
risk level
Resiliency
pubcrawl
Organizations
N2FMEA
belief networks
Metrics
Fuzzy logic
fault trees
fault diagnosis
failure mode
failure analysis
failure (mechanical)
Electronic mail
Complexity theory
complex underwater system
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
next ›
last »