Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
risk assessment
biblio
Security Risk Assessment of Information Systems in an Indeterminate Environment
Submitted by grigby1 on Fri, 08/26/2022 - 10:58am
information systems security
uncertainty
tools
security
Scalability
risk management
risk assessment
Resiliency
resilience
pubcrawl
Information systems
Human behavior
Fuzzy Inference Scheme
expert systems
Computational modeling
Bayesian belief network
Bayes methods
biblio
Cyber-Security Enhancement of Smart Grid's Substation Using Object's Distance Estimation in Surveillance Cameras
Submitted by grigby1 on Mon, 04/18/2022 - 10:57am
resilience
YOLO
threat detection
surveillance
Substations
Streaming media
Security Risk Estimation
Scalability
risk assessment
Conferences
pubcrawl
Metrics
Meters
Human Factors
fully convolutional deep network
detection algorithms
Cyber-security
Convolutional codes
biblio
Cyber Supply Chain Risk Management
Submitted by willirn1 on Tue, 10/26/2021 - 10:59am
systems security engineering
Executive Order 13636
Cyberspace Policy Review
Cybersecurity Strategy and Implementation Plan
Cybersecurity Enhancement Act
Comprehensive National Cybersecurity Initiative
software & firmware
Hardware
cloud & virtualization
Vulnerability Management
C-SCRM
security programs & operations
security measurement
security controls
risk assessment
malware
information sharing
cyber supply chain risk management
controls assessment
biblio
NCSC Unveils New Supply Chain Risk Management Guidance
Submitted by willirn1 on Fri, 10/22/2021 - 11:13am
C3E
supply chains
risk assessment
Cybersecurity
biblio
The Cyber Risk Analytics Project Review Workshop
Submitted by willirn1 on Fri, 10/22/2021 - 10:46am
Cybersecurity
C3E
risk assessment
information technology
biblio
Innovative Predictive Model for Smart City Security Risk Assessment
Submitted by grigby1 on Tue, 10/12/2021 - 2:46pm
Predictive models
what “if” methodology
Smart City
smart cities
security
risk management
risk assessment
pubcrawl
predictive security metrics
Analytical models
predictive model
Prediction algorithms
Metrics
domino effect
Data models
consequences calculation
Big Data Analytics
biblio
Information security risk assessment based on decomposition probability via Bayesian Network
Submitted by aekwall on Tue, 04/27/2021 - 1:10pm
Measurement
web security
Urban areas
security
risk management
risk assessment
Resiliency
pubcrawl
probability of cyberattacks
belief networks
IT security
Information systems
information security
Cybersecurity
cyberattack
cyber-physical systems
computer security
biblio
Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries
Submitted by aekwall on Thu, 04/08/2021 - 4:34pm
rewriting systems
system-level security facilities
rewriting-based randomization
quantitative assessment
legacy software systems
legacy software
legacy binaries
fine-grained randomization tools
code-reuse attacks
Binary Rewriting
advanced security attacks
Information Reuse and Security
security of data
source code
Binary codes
code-reuse attack
fine-grained code randomization
code randomization
Compositionality
software maintenance
risk assessment
pubcrawl
Resiliency
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
Towards Security Attack and Risk Assessment during Early System Design
Submitted by grigby1 on Mon, 03/29/2021 - 12:02pm
pubcrawl
task mappings
system designers
smart devices
security vulnerabilities
security risk
security constraints
security attackers
security attack
Secure IoT Systems
Secure Embedded Consumer Devices
risk assessment
Resiliency
resilience
composability
Metrics
IoT devices
Internet of Things
embedded systems
Embedded System Design
design space exploration tools
Design Space Exploration
cybersecurity attacks
cyber-physical systems
cyber security
CPS
computer network security
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »