Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
risk assessment
biblio
Identification and Assessment of Risks Affecting Sociotechnical Systems Resilience
Submitted by aekwall on Mon, 03/01/2021 - 3:49pm
Measurement
work factor metrics
sociotechnical systems resilience
risk Identification
Resiliencebased risk matrix
resilience engineering
identifying assessing risk factors
5×5 matrix
resilience planning
Resilience Metrics
resilience
Scalability
Planning
Capacity planning
risk assessment
Economics
risk management
Decision Making
Robustness
pubcrawl
Resiliency
biblio
Are You a Favorite Target For Cryptojacking? A Case-Control Study On The Cryptojacking Ecosystem
Submitted by grigby1 on Wed, 02/10/2021 - 12:10pm
Web sites
risk assessment
CryptoJacking websites
cryptojacking ecosystem
cryptojacking campaigns
compromised websites
Case-control study
browser-based mining
cryptojacking
cryptocurrency
Web servers
Hash functions
Cryptography
bitcoin
Semantics
privacy
Ecosystems
Resiliency
resilience
Metrics
Human behavior
pubcrawl
cryptocurrencies
Data mining
biblio
A Framework for Risk Assessment in Augmented Reality-Equipped Socio-Technical Systems
Submitted by grigby1 on Wed, 02/03/2021 - 12:10pm
privacy
visualization
technical entities
taxonomy
sociotechnical systems
socio-technical systems
socio-economic effects
security of data
safety modeling
Safety
risk management
risk assessment
risk analysis
resilience
pubcrawl
Analytical models
immersive visual technology
immersive systems
Human Factors
human capabilities
Human behavior
extended human function
dependability threat
cyber physical systems
composability
augmented reality-equipped socio-technical systems
augmented reality
AR-relevant dependability threats
AR-extended human failures
AR-equipped socio-technical systems
biblio
Deploying Privacy as a Service within a Cloud-Based Framework
Submitted by aekwall on Mon, 12/07/2020 - 11:33am
cloud-based framework
trustworthy cloud services
software-based
software toolkit
service concepts
privacy regulations
PRIVAaaS
MAPE-K control loop
MAKE-K
good option
feedback control loop
deployment environment
data leakages
Cloud Computing
cloud systems
ATMOSPHERE Platform
privacy violations
cloud
trustworthiness
risk assessment
feedback
privacy
composability
pubcrawl
Trusted Computing
data privacy
biblio
Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model Enhancement
Submitted by grigby1 on Fri, 11/20/2020 - 1:27pm
Information systems
Servers
security risks
Security Policies Analysis
risk management
risk assessment model
risk assessment approach
risk assessment
RBAC
pubcrawl
policy-based governance
model enhancement
Access Control
information system security
Databases
Database Security
correlation links
Correlation
authorisation
Anomalies Correlation
access control service
access control policy
access control policies management
biblio
Research on Operating Data Analysis for Enterprise Intranet Information Security Risk Assessment
Submitted by grigby1 on Tue, 11/17/2020 - 1:40pm
enterprise intranet
Operating systems security
user operation logs
security relevant configurations
risk assessment
operating system logs
operating data analysis
Operating Data
information security knowledge
enterprise intranet information security risk assessment
risk management
intranets
resilience
composability
computer network security
Resiliency
Metrics
pubcrawl
data analysis
biblio
Parametric Analyses of Attack-Fault Trees
Submitted by grigby1 on Tue, 10/06/2020 - 1:01pm
risk assessment
parametric analyses
parametric timed automata
parametric weighted timed automata
power plants
pubcrawl
resilience
Resiliency
risk analysis
parameter values
Safety
safety engineering
security
security of data
tree-based formalism
trees (mathematics)
Unified modeling language
cyber-physical systems
automata
automata theory
composability
Concurrency
connected devices
Cost accounting
CPS
cyber physical systems
attack-fault trees
fault scenarios
fault trees
formal verification
imitator
Logic gates
Metrics
model-checker IMITATOR
biblio
Risk Assessment of Industrial Internet System By Using Game-Attack Graphs
Submitted by aekwall on Mon, 08/17/2020 - 10:17am
search engines
search engine keyword segment matching method
scan components
open services
nondestructive asset profiling
industrial internet system
game-attack graph-based risk assessment model
attribute attack graph
attack rule base
Attack Path
asset threat list
attack graphs
attack graph
Nash Equilibrium
Predictive Metrics
security of data
industrial control
risk analysis
probability
communication protocols
risk assessment
risk management
internet
graph theory
composability
pubcrawl
Resiliency
game theory
Protocols
security
biblio
Multimodal, Multiuser Immersive Brainstorming and Scenario Planning for Intelligence Analysis
Submitted by grigby1 on Thu, 06/04/2020 - 10:47am
intelligence analysis
tools
Task Analysis
Software
scenario planning advisor
scenario planning
risk assessment
Resiliency
resilience
pubcrawl
privacy
planning (artificial intelligence)
Planning
multiuser Immersive brainstorming
multimodal interaction
Analytical models
immersive systems
immersive environment
IBM
Human Factors
cyber physical systems
composability
collaboration
cognitive immersive systems lab
cognitive immersive software
cognition
CISL
brainstorming tool
brainstorming
biblio
Risk Assessment Approach to Secure Northbound Interface of SDN Networks
Submitted by aekwall on Mon, 03/09/2020 - 10:16am
risk assessment
traffic demand requests
telecommunication traffic
software defined networking
Security Risk Estimation
security
secure Northbound interface
SDN network administrators
SDN
Scalability
risk management
risk assessment approach
accurate risk estimation
Resiliency
RAMSES
pubcrawl
Northbound-API
network optimization tool
network cost
Metrics
Human Factors
computer network security
computer network management
application program interfaces
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »