Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
risk management
biblio
CVSS-Based Probabilistic Risk Assessment for Cyber Situational Awareness and Countermeasure Selection
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
Metrics
Silicon
SIEM systems
SIEM
Security Metrics
security information and event management system
security events
risk management
risk assessment
Resiliency
resilience
Reliability
pubcrawl
Prototypes
network characteristics
attack graphs
Measurement
integrated security metrics
cyber situational awareness
CVSS-based probabilistic risk assessment
CVSS
countermeasure selection
computer network security
computer network risk assessment
composability
Common Vulnerability Scoring System
authentication
attacker characteristics
Attack Modeling
biblio
Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
message passing
risk management
risk assessment
Resiliency
resilience
region graph
pubcrawl
Probabilistic logic
Metrics
attack graph
Measurement
Force
factor graph
Computers
composability
Complexity theory
belief propagation
attack graphs
biblio
An Information Security Risk Assessment Algorithm Based on Risk Propagation in Energy Internet
Submitted by grigby1 on Mon, 03/05/2018 - 12:12pm
partitions
threat propagation effect
security of data
security
RM algorithm
risk management
risk analysis
Resiliency
resilience
pubcrawl
propagation risk value
propagation effect
power systems
power engineering computing
composability
Nickel
Metrics
matrix algebra
logical network location
ISRADRP
internet
information system
information security risk assessment algorithm
information security risk assessment
energy internet
Dynamic Risk Propagation
dynamic networks
Dependency Structure Matrix
biblio
An Information Security Risk Assessment Algorithm Based on Risk Propagation in Energy Internet
Submitted by grigby1 on Mon, 03/05/2018 - 12:11pm
partitions
threat propagation effect
security of data
security
RM algorithm
risk management
risk analysis
Resiliency
resilience
pubcrawl
propagation risk value
propagation effect
power systems
power engineering computing
composability
Nickel
Metrics
matrix algebra
logical network location
ISRADRP
internet
information system
information security risk assessment algorithm
information security risk assessment
energy internet
Dynamic Risk Propagation
dynamic networks
Dependency Structure Matrix
biblio
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
Scalability
OIDC
open authentication
openid connect
open systems
Protocols
pubcrawl
Resiliency
risk management
SAML
OAuth
security assertion markup language
security strength
security vulnerability
Servers
Software Architecture
SSO
standards
technical security measure
XSS
federated identity management
authentication
authorisation
authorization
Cloud Computing
cloud environment
computer systems access
Data protection
digital identities security
DoS
architectural design
FIdM
FIdM standard
Human behavior
Identity management
IT infrastructure
legal security measure
Markup languages
message authentication
MITM
biblio
Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks
Submitted by K_Hooper on Wed, 02/14/2018 - 10:59am
SCADA network cyber-attacks
machine learning
Metrics
production engineering computing
pubcrawl
Resiliency
risk assessment
risk management
SCADA network
Logic gates
SCADA security risk assessment
SCADA systems
SCADA Systems Security
Scalability
security
security risk level
supervisory control and data acquisition
Damage Assessment
learning (artificial intelligence)
industrial systems
industrial facilities
incremental learning
Human behavior
cyber-security risk assessment model
Cyber-security
critical infrastructures
computer network security
Communications technology
belief networks
Bayesian network
Bayes methods
artificial intelligence security
Adaptation models
biblio
Towards Automation in Information Security Management Systems
Submitted by grigby1 on Tue, 02/06/2018 - 12:54pm
small and medium-sized enterprises
Process Automation
pubcrawl
Resiliency
risk management
Scalability
security controls automation
security of data
security requirements
Metrics
small-to-medium enterprises
Stakeholders
standards
tools
ubiquitous computing
Ubiquitous Computing Security
workflow enactment
information protection
automated process execution
automation
context-aware ISMS
continuous risk-driven ISMS
Data protection
highly interconnected information security management
Human behavior
Human Factors
ADAMANT
information security
Information Security Management System
information security management systems
Information Security Risk Management
Information systems
ISMS related activities
ISO 27001 compliant ISMS
biblio
A Quantitative CVSS-Based Cyber Security Risk Assessment Methodology for IT Systems
Submitted by grigby1 on Tue, 02/06/2018 - 12:44pm
pubcrawl
Vulnerability Management
Vulnerability
system risk assessments
standards
security of data
Scalability
risk views
risk metrics values
risk metrics
risk management frameworks
risk management
risk assessment
Resiliency
quantitative CVSS
attack graphs
probability
Organizations
Metrics
Measurement
IT systems
high level risk metrics
graph theory
detailed risk assessment
cyber threats
cyber security risks
cyber security risk assessment methodology
computer security
big data security metrics
biblio
From control system security indices to attack identifiability
Submitted by grigby1 on Thu, 12/28/2017 - 12:34pm
Indexes
sparsity constraints
security
Science of Security
Scalability
risk management
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
Metrics
Linear systems
linear dynamical systems
actuators
Human Factors
Human behavior
fault diagnosis
fault detection
control system security indices
composability
collaboration
attack identifiability
attack detectability
anomaly detectors
biblio
Bayesian decision model with trilateration for primary user emulation attack localization in cognitive radio networks
Submitted by K_Hooper on Wed, 12/20/2017 - 10:29am
Resiliency
probability
PU
PU-PUE
pubcrawl
PUE attacker
PUE position
received signal strength indication
Received signal strength indicator
primary user emulation attack localization
risk management
RSSI
telecommunication security
Trilateration
trilateration technique
uncertainty
wireless sensor networks
Bayes methods
Primary user Emulation
physical network layer coding
network coding
lost function
licensed channel
DoS attack
deny-of-service attack
decision theory
conditional probability
Cognitive Radio Security
cognitive radio networks
cognitive radio
Channel estimation
Bayesian decision theory
Bayesian decision model
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
next ›
last »