Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Security Metrics
biblio
CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems
Submitted by grigby1 on Wed, 11/04/2020 - 12:35pm
API interoperability issues
Attack Surfaces
auditing
BrokerMonkey
bucket policy misconfigurations
Cascading style sheets
chaos engineering failure injection strategies
Cloud Audit
cloud auditing schemes
Cloud Computing
cloud security system
cloud storage broker systems
cloud storage services
Cloud-Security
CloudRAID
Common Configuration Scoring System
Computational modeling
continuous snapshotting mechanism
CSB resource audits
CSBAuditor
fault tolerance
fault tolerant computing
malicious activities
malicious insider threats
Measurement
Metrics
metrics testing
multicloud strategy
open systems
proactive security risk analysis
pubcrawl
reference CSB system
risk analysis
risk management
Secure Configuration
security
security complexities
Security Metrics
security of data
security risk assessment
storage management
biblio
Measuring Impact Score on Confidentiality, Integrity, and Availability Using Code Metrics
Submitted by grigby1 on Wed, 11/04/2020 - 12:35pm
Availability Score
CIA Model
Code Characteristics
code metrics
Complexity theory
Confidentiality Score
Correlation
Couplings
CVSS
Integrity Score
Measurement
Metrics
metrics testing
national vulnerability database
Object oriented modeling
object-oriented methods
object-oriented PHP application
PHP security
pubcrawl
secure software
security
Security Metrics
security of data
Software
software metrics
software quality
software quality metrics
software security
software vulnerabilities
source code (software)
vulnerable source code
biblio
Ontology-based Dynamic and Context-aware Security Assessment Automation for Critical Applications
Submitted by aekwall on Mon, 11/02/2020 - 1:46pm
application configurations
application security
automation
Business
context-aware security assessment automation
critical infrastructure
Dynamic Application Security Testing
Measurement
metrics testing
Metrics
Ontologies
ontologies (artificial intelligence)
Ontology
ontology-based dynamic security assessment automation
ontology-based security model
pubcrawl
quantifiable security assessment process
security aptitude
security assessment architecture
Security Metrics
security of data
security testing
standards
testing
tools
ubiquitous computing
virtualisation
Virtualization
biblio
Improved Veron Identification and Signature Schemes in the Rank Metric
Submitted by grigby1 on Tue, 10/06/2020 - 12:51pm
cheating probability
code-based signature schemes
Computing Theory
Cryptography
Decoding
digital signatures
double circulant codes
error correction codes
error-correcting codes
Fiat-Shamir transform
identification protocol
linear codes
Measurement
Metrics
probability
Protocols
pubcrawl
public key cryptography
public key size
quantum computing
quantum cryptography
random oracle model
rank metric
secure signature scheme
Security Metrics
signature size
smallest signature
Transforms
veron identification
biblio
How Secure Is Your IoT Network?
Submitted by grigby1 on Tue, 10/06/2020 - 12:51pm
Attack Circuit
attack graph
attack graphs
Computing Theory
Exploitability
graph theory
impact
Internet of Things
IoT device security
IoT network security
Metrics
Network
network flow
pubcrawl
Risk
security
security assessment
Security Metrics
security of data
SIEM logs
Vulnerability
biblio
Cyber-Physical Interdependencies in Power Plant Systems: A Review of Cyber Security Risks
Submitted by grigby1 on Tue, 10/06/2020 - 12:50pm
advanced communication technologies
Analytical models
communication direction
computational complexity
Computational modeling
Computing Theory
control parameters
critical infrastructure
cyber security risks
Cyber-physical attacks
cyber-physical interdependencies
cyber-physical systems
digital transformation process
graph theory
graph-based models
interdependent connections
Metrics
modern computing
network topology
network-based models
power engineering computing
power generation
power plant systems
power plants
pubcrawl
Reliability
research target
Safety
Security Metrics
security of data
smart cities
Smart City
Smart Grid
system components
Topology
biblio
Vulnerability Modelling for Hybrid IT Systems
Submitted by grigby1 on Tue, 10/06/2020 - 12:50pm
actual vulnerabilities
attack paths
Australia
Common Vulnerability Scoring System
Complexity theory
computer network security
Computing Theory
critical nodes
CVSS
CVSS v3 framework
CVSSIoT
embedded systems
improved vulnerability scoring system
industry standard
Internet of Things
IoT
IoT devices
IoT embedded networks
IoT systems
Measurement
Metrics
national vulnerability database
network topology
pubcrawl
realistic IT supply chain system
Safety
security
Security Metrics
Supply Chain
Topology
traditional computer systems
traditional IT security models
Vulnerability
Vulnerability Evaluation
vulnerability modelling
biblio
Availability as a Metric for Region-Scale Telecommunication Designs
Submitted by grigby1 on Tue, 10/06/2020 - 12:50pm
availability characteristic
Buildings
Communication channels
Computing Theory
internet
Measurement
Metrics
network availability
network growth process
Passive optical networks
pubcrawl
qualitative characteristics
queuing theory
region-scale telecommunication designs
regional scale networks
Routing
Routing protocols
Security Metrics
simulation modeling
telecommunication network planning
biblio
Placement optimization of IoT security solutions for edge computing based on graph theory
Submitted by grigby1 on Tue, 10/06/2020 - 12:50pm
Centrality
centrality metrics
computer network security
Computing Theory
Cryptography
dominating set
edge computing
edge computing security
EndToEnd like encryption
graph theory
Internet of Things
IoT
IoT network
IoT security framework
IoT security solutions
Metrics
placement optimization
pubcrawl
security as a service
security functions
Security Metrics
biblio
Method of Ensuring Cyber Resilience of Digital Platforms Based on Catastrophe Theory
Submitted by grigby1 on Tue, 10/06/2020 - 12:40pm
Big Data
Cognitive Computing
Computing Theory
Controllability
cyber resistance
digital economy
digital transformation
Internet of Things IIoT / IoT
models and methods of artificial intelligence
proactive cybersecurity and adaptability
pubcrawl
resilience
Resiliency
robotics
Security Metrics
self-organization
1
2
3
4
5
6
7
8
9
…
next ›
last »