Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
risk management
biblio
Cyber-Physical Risk Driven Routing Planning with Deep Reinforcement-Learning in Smart Grid Communication Networks
Submitted by grigby1 on Tue, 02/16/2021 - 12:40pm
intelligent algorithms
power generation planning
risk assessment model
deep reinforcement learning
communication link
Constraint-Dijkstra algorithm
cyber-physical system
deep reinforcement-learning
DRL
information space
physical space
link load balance
node load pressure
power grid system
Risk Balance
route planning algorithm
Routing Planning
service communication delay
Damage Assessment
smart power grids
risk management
CPS
cyber-physical systems
pubcrawl
resilience
Resiliency
optimization
power engineering computing
learning (artificial intelligence)
Communication networks
Planning
Routing
delays
Load modeling
Smart Grids
neural nets
smart grid communication networks
biblio
Differentially Private Generation of Social Networks via Exponential Random Graph Models
Submitted by grigby1 on Tue, 02/16/2021 - 12:25pm
network information preservation
Data Sanitization
college student friendship network
conditional probability
differentially private social network generation
DP-EGRM
exponential random graph model
exponential random graph model (ERGM)
goodness of fit
latent space models
Bayes methods
network statistics
node differential privacy (DP)
posterior distribution
privacy risk level
private dyadwise randomized response
private network
sensitive relational information
synthetic social networks
Compositionality
security of data
risk management
pubcrawl
Human behavior
resilience
Resiliency
data privacy
Data models
privacy
probability
differential privacy
random processes
graph theory
Social network services
social networking (online)
Bayesian
social networks
biblio
A Framework for Risk Assessment in Augmented Reality-Equipped Socio-Technical Systems
Submitted by grigby1 on Wed, 02/03/2021 - 12:10pm
privacy
visualization
technical entities
taxonomy
sociotechnical systems
socio-technical systems
socio-economic effects
security of data
safety modeling
Safety
risk management
risk assessment
risk analysis
resilience
pubcrawl
Analytical models
immersive visual technology
immersive systems
Human Factors
human capabilities
Human behavior
extended human function
dependability threat
cyber physical systems
composability
augmented reality-equipped socio-technical systems
augmented reality
AR-relevant dependability threats
AR-extended human failures
AR-equipped socio-technical systems
biblio
Network Security Analysis of Industrial Control System Based on Attack-Defense Tree
Submitted by grigby1 on Wed, 02/03/2021 - 11:55am
fuzzy consistency matrix
security attributes
attack behavior
attack-defense tree model
automatic control system
defense leaf nodes
defense measures
defense node
fuel systems
fuzzy analytic hierarchy process
Oils
leaf node characteristics
network risk assessment
network security analysis
network security scheme
Petroleum
quantifiable attack-defense tree model
security attribute weight
typical airport oil supply
industrial control
security
pubcrawl
resilience
Resiliency
computer network security
matrix algebra
Analytical models
Scalability
Decision Making
risk management
Industrial Control Systems
industrial control system
network attack
Airports
trees (mathematics)
probability
Atmospheric modeling
analytic hierarchy process
biblio
Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems
Submitted by grigby1 on Wed, 02/03/2021 - 11:55am
risk management
miniature ICS
proactive security response
probabilistic multiattribute vulnerability criticality analysis model
production engineering computing
pubcrawl
quantitative evaluation
quantitative security metrics
resilience
Resiliency
Metrics
Scalability
Security Criticality Analysis
Security Impact Analysis
security of data
security risk assessment scheme
Vulnerability Analysis
vulnerability host components
vulnerability severities
vulnerability-based impact criticality estimation
Functional Dependency
Compositionality
control engineering computing
control uncertainties
Cyber Dependencies
cyber environments
cyber security risks
cyber threats
Cybersecurity
distributed system
attack probabilities
Human Factors
ICS networks
ICS security
impact estimation
industrial control
Industrial Control System (ICS)
Industrial Control Systems
MAVCA model
biblio
Risk and Trust in artificial intelligence technologies: A case study of Autonomous Vehicles
Submitted by aekwall on Mon, 02/01/2021 - 10:39am
human trust
Vehicle crash testing
risk conditions
lower trust levels
low trust
integrity levels
higher trust levels
high trust
eletrodermal activity responses
Electrodermal activity
drive experience
autonomous vehicle driving game
autonomous vehicle
automotive safety
artificial intelligence technologies
autonomous vehicles
psychology
Artificial Intelligence
Human Factors
Particle measurements
Atmospheric measurements
Games
AVs
Risk
risk management
trust
Roads
pubcrawl
Human behavior
road safety
biblio
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks
Submitted by aekwall on Mon, 01/25/2021 - 12:02pm
security
Protocols
Software
computer architecture
Resiliency
pubcrawl
composability
Databases
tools
risk management
network attacks
Predictive Metrics
attack graph
attack graphs
MulVal
network protocols
biblio
A Theoretical Review: Risk Mitigation Through Trusted Human Framework for Insider Threats
Submitted by grigby1 on Tue, 12/01/2020 - 12:59pm
Personnel
trusted human framework
Trusted Computing
software engineering
security of data
risk mitigation
risk management
pubcrawl
potential employees
cyclic process
People Process and Technology
on-going process
insider threats risk
Insider Threats
human trust
Human behavior
enterprise risk management activities
biblio
Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model Enhancement
Submitted by grigby1 on Fri, 11/20/2020 - 1:27pm
Information systems
Servers
security risks
Security Policies Analysis
risk management
risk assessment model
risk assessment approach
risk assessment
RBAC
pubcrawl
policy-based governance
model enhancement
Access Control
information system security
Databases
Database Security
correlation links
Correlation
authorisation
Anomalies Correlation
access control service
access control policy
access control policies management
biblio
Research on Operating Data Analysis for Enterprise Intranet Information Security Risk Assessment
Submitted by grigby1 on Tue, 11/17/2020 - 1:40pm
enterprise intranet
Operating systems security
user operation logs
security relevant configurations
risk assessment
operating system logs
operating data analysis
Operating Data
information security knowledge
enterprise intranet information security risk assessment
risk management
intranets
resilience
composability
computer network security
Resiliency
Metrics
pubcrawl
data analysis
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »