Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
risk management
biblio
An Edge-Cloud Synergy Integrated Security Decision-Making Method for Industrial Cyber-Physical Systems
Submitted by aekwall on Tue, 06/01/2021 - 1:24pm
security
Cloud Computing
Cryptography
game theory
Bayes methods
pubcrawl
composability
Computational modeling
Image edge detection
computational intelligence
risk management
decision-making
Games
Compositionality
edge-cloud synergy
industrial cyber-physical system (ICPS)
biblio
Research and implementation of network attack and defense countermeasure technology based on artificial intelligence technology
Submitted by grigby1 on Thu, 05/13/2021 - 11:57am
Data mining
Security Detection Technology
network attack and defense
information security risk
Computer crashes
artificial intelligence technology
artificial intelligence security
Task Analysis
Artificial Intelligence
risk management
composability
Communication networks
Resiliency
resilience
Metrics
Human behavior
pubcrawl
security
biblio
Attack Surface Assessment for Cybersecurity Engineering in the Automotive Domain
Submitted by aekwall on Thu, 05/13/2021 - 11:37am
automotive security
threat mitigation and resilience
threat analysis and risk assessment (TARA)
ISO/SAE 21434
ISO 15118
cybersecurity engineering
connected car
Autosar
attack feasibility rating
attack surface
Surface treatment
automobiles
Scalability
risk analysis
computer security
risk management
Metrics
pubcrawl
Resiliency
road vehicles
Automotive engineering
biblio
Information security risk assessment based on decomposition probability via Bayesian Network
Submitted by aekwall on Tue, 04/27/2021 - 1:10pm
Measurement
web security
Urban areas
security
risk management
risk assessment
Resiliency
pubcrawl
probability of cyberattacks
belief networks
IT security
Information systems
information security
Cybersecurity
cyberattack
cyber-physical systems
computer security
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
Modeling the Structures of Threats to Information Security Risks based on a Fuzzy Approach
Submitted by grigby1 on Mon, 03/29/2021 - 1:29pm
resilience
threat
synthesis
structure
security
Scalability
risk management
Risk
Resiliency
Aggregates
pubcrawl
Probabilistic logic
Linguistics
Input variables
information security
Human behavior
fuzzy conclusion
expert systems
biblio
Risks Identification in the Exploitation of a Geographically Distributed Cloud Infrastructure for Storing Personal Data
Submitted by grigby1 on Mon, 03/29/2021 - 1:14pm
Scalability
natural person
Object recognition
payment information records
personal data
personal data records
privacy
processing
pubcrawl
Risk
risk Identification
risk management
models
security
security of data
Servers
social engineering techniques
storage management
stored resources
storing personal data
system
Task Analysis
technical project
unsecured service
Data protection
augumented reality
Big Data
Cloud Computing
cloud services
cloud storage administrators
Companies
confidential information leaks
controller
cyber incidents
data leak
data privacy
auditing storage
data storage subsystem
data subject GDPR
digital twin
Distributed databases
expert systems
geographically distributed cloud infrastructure
geographically distributed company
high-loaded infocommunications systems
Human Factors
information quality
Kaspersky Lab
biblio
Identification and Assessment of Risks Affecting Sociotechnical Systems Resilience
Submitted by aekwall on Mon, 03/01/2021 - 4:49pm
Measurement
work factor metrics
sociotechnical systems resilience
risk Identification
Resiliencebased risk matrix
resilience engineering
identifying assessing risk factors
5×5 matrix
resilience planning
Resilience Metrics
resilience
Scalability
Planning
Capacity planning
risk assessment
Economics
risk management
Decision Making
Robustness
pubcrawl
Resiliency
biblio
A Specification-Based Detection for Attacks in the Multi-Area System
Submitted by grigby1 on Tue, 02/16/2021 - 1:41pm
security assessment
Damage Assessment
three-area system model
system-level
specification-based detection
rule-based method
protection measures
novel specification-based method
multiarea system
grid operation
frequency deviation
extensive power grid
cyber-physical grid
cyber-attack events
automatic generation control signals
false data injection attack detection
security of data
Frequency measurement
frequency control
automatic generation control
power system stability
power grids
Smart Grids
power system security
power engineering computing
Resiliency
resilience
pubcrawl
Anomaly Detection
security
risk management
biblio
Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations
Submitted by grigby1 on Tue, 02/16/2021 - 1:40pm
documentation
Damage Assessment
smart buildings
smart building stakeholders
smart building risk assessment methodology
smart building risk assessment case study
inter-networked control systems
cost effective risk management
comprehensive risk assessment process
Stakeholders
cyber-physical systems
building management systems
Internet of Things
risk analysis
Buildings
control systems
control engineering computing
Resiliency
resilience
pubcrawl
Monitoring
security
risk management
security of data
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »