Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Threat Modeling
biblio
A Threat Modeling Approach for Cloud Storage Brokerage and File Sharing Systems
Submitted by grigby1 on Thu, 09/26/2019 - 10:42am
security challenges
Measurement
Metrics
Peer-to-peer computing
pubcrawl
resilience
Resiliency
risk management
Secure Configuration
Secure File Sharing
security
Mathematical model
Security Metrics
security of data
security risk assessment
storage management
Threat Modeling
threat modeling schema
threat models
tools
trees (mathematics)
Common Configuration Scoring System
Cloud Computing
Cloud Security
cloud stakeholders
Cloud storage brokerage systems
Cloud Storage Brokers
cloud storage complexities
Cloud storage Enumeration Attack
Cloud Storage Exploitation Attack
cloud storage systems
Cloud-Security
attack tree
composability
comprehensive risk assessments
Computational modeling
conflicting security policies
Data models
file sharing systems
Human behavior
Human Factors
identified security risks
biblio
Risk-Based Design Security Analysis
Submitted by grigby1 on Mon, 06/17/2019 - 11:50am
design
Human Factors
Metrics
pubcrawl
resilience
risk analysis
Scalability
security
Security Risk Management
Threat Modeling
biblio
Threat Extraction Method Based on UML Software Description
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
knowledge based systems
Automated Secure Software Engineering
Unified modeling language
UML software description
threat knowledge base
threat extraction method
Software systems
software system
software development
software behavior
software application
sequence diagram
security relevant attributes
Threat Modeling
human knowledge
Extracting threats
software engineering
Databases
software security
Computational modeling
composability
pubcrawl
Resiliency
security
security of data
biblio
Knowledge-enriched Security and Privacy Threat Modeling
Submitted by aekwall on Wed, 02/13/2019 - 11:55am
design
model enrichment
security
Threat Modeling
Resiliency
Human behavior
pubcrawl
metric
threat mitigation
biblio
A Meta Language for Threat Modeling and Attack Simulations
Submitted by grigby1 on Fri, 02/08/2019 - 4:30pm
attack graphs
composability
Cyber Dependencies
cyber security
domain specific language
Metrics
pubcrawl
resilience
Resiliency
Threat Modeling
biblio
Complexity of Insider Attacks to Databases
Submitted by grigby1 on Thu, 05/24/2018 - 12:08pm
complexity analysis
composability
Human behavior
insider threat
Metrics
pubcrawl
query intent
query logs
relational database security
resilience
Resiliency
Security Risk Management
Threat Modeling
biblio
Analyzing the Effectiveness of Attack Countermeasures in a SCADA System
Submitted by grigby1 on Wed, 05/09/2018 - 2:49pm
CPS resilience
Compositionality
cyber security
Human behavior
Networked Control Systems Security
pubcrawl
resilience
Resiliency
SCADA system
SCADA systems
security
security controls
Threat Modeling
vulnerability assessment
biblio
Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions
Submitted by K_Hooper on Wed, 05/02/2018 - 10:41am
attacker capabilities
composability
Metrics
pubcrawl
Resiliency
Sybil attack
sybil attacks
Threat Modeling
vulnerabilities
biblio
Software and Attack Centric Integrated Threat Modeling for Quantitative Risk Assessment
Submitted by grigby1 on Mon, 05/22/2017 - 2:06pm
attack graphs
composability
cyber-physical systems
Human behavior
Metrics
pubcrawl
Quantitative risk assessment
Resiliency
Threat Modeling
threat vectors
biblio
Towards a Systematic Threat Modeling Approach for Cyber-physical Systems
Submitted by Katie Dey on Thu, 04/07/2016 - 4:37pm
Modeling
Resilient Systems
Science of Security
Foundations
SURE Project
Threat Modeling
systematic analysis
« first
‹ previous
1
2
3
next ›
last »