Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
risk assessment
biblio
Risk Assessment of Cyber Access to Physical Infrastructure in Cyber-Physical Systems
Submitted by grigby1 on Mon, 04/03/2017 - 11:54am
composability
computer networks
CPS Privacy
cyber-physical systems
Cyber-security
Human behavior
Metrics
network control systems
network control systems security
networked control systems
pubcrawl
Resiliency
risk assessment
security
biblio
Risk assessment of agricultural supply chain based on AHP- FCS in Eastern Area of Hunan Province
Submitted by grigby1 on Wed, 03/08/2017 - 2:26pm
natural disasters
the AHP- FCS method
supply chains
Supply Chain
security
risk management
risk assessment
risk analysis
Reliability
pubcrawl170112
agricultural product
Hunan province
fuzzy set theory
fuzzy comprehensive analysis
Face
economic development stability
analytic hierarchy process
AHP- FCS
agricultural supply chain
agricultural products
biblio
Current efforts in ports and supply chains risk assessment
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
pubcrawl170112
supply chains
supply chain risk assessment
supply chain partners
Supply Chain
standards
security of data
security
sea ports
risk management
risk assessment
CII
Ports (Computers)
port service risk assessment
physical /cyber security
maritime supply chain processes
Marine vehicles
marine engineering
goods dispatch data processing
critical infrastructures
critical information infrastructures
complex interrelated ICT systems
biblio
Improving security decision under uncertainty: A multidisciplinary approach
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
requirements engineering
uncertainty
software engineering
security threat
security risk
security of data
security decision-making
security
risk management
risk assessment
Risk
Companies
quantitative decision analysis
pubcrawl170109
modelling language
identity theft
decision-making
Decision Making
crime script
crime science
Credit cards
biblio
Defending mechanisms for protecting power systems against intelligent attacks
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
defending mechanisms
game theory
Games
generalized game models
intelligent attacks
Load modeling
Nash Equilibrium
Numerical models
Power system protection
power system security
power systems
pubcrawl170107
pubcrawl170108
risk assessment
zero-sum game model
biblio
A graph-based evidence theory for assessing risk
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
Power Grid
uncertainty
security of data
security
rule-based systems
risk management
risk evaluation
risk assessment
reduced power set
pubcrawl170108
pubcrawl170107
power grids
cyber-physical layers
knowledge based systems
internet
heterogeneous sources
graph-based evidence theory
graph theory
graph representation
fuzzy theory
fuzzy set theory
epistemic uncertainty management
Electronic mail
biblio
Cyber Security Risk Assessment for Industrial Automation Platform
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
IAP software
standards
Software
security of data
risk management
risk assessment
pubcrawl170108
pubcrawl170107
protective strategy
industrial control system
industrial control
industrial automation platform
analytic hierarchy process
fuzzy set theory
fuzzy comprehensive evaluation method
fuzzy analytic hierarchy process
entropy theory
Entropy
cyber security risk assessment
cyber security
computer security
communication links
communication link risk
automation
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Wed, 05/06/2015 - 1:58pm
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
biblio
Studies of Integration Readiness Levels: Case Shared Maritime Situational Awareness System
Submitted by BrandonB on Tue, 05/05/2015 - 12:41pm
IRL metrics
Systems engineering and theory
surveillance
situational awareness
sharing mechanisms
shared maritime situational awareness system
risk assessment
risk analysis
pre-operational validation
operational validation
National security
Measurement
maturity
border control information interactions
Interviews
integration readiness levels
integration readiness level metrics
integration
Information systems
information system integration
Finnish national border control domains
European border control domains
control systems
Context
Buildings
border control information systems
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Fri, 05/01/2015 - 7:31am
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »