Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
risk management
biblio
A Framework for Risk Management of Large-Scale Organisation Supply Chains
Submitted by grigby1 on Fri, 09/09/2022 - 2:54pm
tools
risk management
pubcrawl
Metrics
delays
Business
risk assessment
supply chains
Machinery
Manufacturing industries
supply chain risk management
supply chain risks
supply chain visibility
supply chain risk assessment
biblio
Information Security of Logistics Services
Submitted by grigby1 on Fri, 09/09/2022 - 2:36pm
supply chain risk assessment
Companies
Economics
information security
Logistics
Monitoring
pubcrawl
resilience
Resiliency
risk management
Safety
security
security management
supply chain security
supply chains
biblio
A Cyber Security Risk Assessment Methodology for CBTC Systems Based on Complex Network Theory and Attack Graph
Submitted by grigby1 on Fri, 08/26/2022 - 2:06pm
cyber security risk assessment
security
Scalability
risk management
Resiliency
pubcrawl
Information systems
Human Factors
Human behavior
Security Risk Management
Control Theory
control systems
Computers
Computer crime
complex networks
complex network theory
Communication-Based Train Control
attack graph
biblio
Security Risk Assessment of Information Systems in an Indeterminate Environment
Submitted by grigby1 on Fri, 08/26/2022 - 9:58am
information systems security
uncertainty
tools
security
Scalability
risk management
risk assessment
Resiliency
resilience
pubcrawl
Information systems
Human behavior
Fuzzy Inference Scheme
expert systems
Computational modeling
Bayesian belief network
Bayes methods
biblio
SSH and Telnet Protocols Attack Analysis Using Honeypot Technique: Analysis of SSH AND ℡NET Honeypot
Submitted by grigby1 on Thu, 06/09/2022 - 1:50pm
cyber attack
℡NET
Resiliency
Cowrie
SSH
honeypot
honey pots
Particle measurements
Human Factors
tools
Protocols
Scalability
Safety
resilience
pubcrawl
IP networks
risk management
information security
biblio
Machine Learning for Threat Recognition in Critical Cyber-Physical Systems
Submitted by grigby1 on Thu, 05/19/2022 - 11:55am
privacy
Trustworthy Artificial Intelligence
threat vectors
threat assessment
Support vector machines
Stress
risk management
Radio frequency
pubcrawl
Trustworthy Systems
Metrics
machine learning
information management
Healthcare
Cybersecurity
cyber-physical systems
critical infrastructures
Computer crime
biblio
Cybersecurity principles for industry and government: A useful framework for efforts globally to improve cybersecurity
Submitted by grigby1 on Thu, 04/21/2022 - 2:08pm
computer security
Cybersecurity
Cyberspace
framework
Government
Industries
industry
Information Technology Industry Council
ITI
principles
risk management
biblio
Cyber-Physical Security Assessment and Resilience of a Microgrid Testbed
Submitted by grigby1 on Mon, 04/18/2022 - 1:37pm
energy management systems
Human behavior
Industries
Inverters
Microgrids
Microgrid Testbed
policy-based governance
pubcrawl
resilience
Resiliency
risk management
security
security weaknesses
biblio
A Functional Approach to Cyber Risk Assessment
Submitted by grigby1 on Mon, 04/18/2022 - 9:57am
Complexity theory
cyber risk assessment
estimation
Human Factors
information security
logistic function
Logistics
Metrics
Organizations
pubcrawl
quantitative methods
resilience
risk management
Scalability
Security Risk Estimation
tools
biblio
Attacking dynamic power system control centers - a cyber-physical threat analysis
Submitted by grigby1 on Mon, 03/14/2022 - 11:37am
pubcrawl
threat analysis
Substations
Smart Grids
SCADA Systems Security
SCADA systems
risk management
Resiliency
resilience
dynamic systems
Power system dynamics
Phasor measurement units
Monitoring
Human behavior
digital twin
Cyber-security
Compositionality
security
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »