Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Assessment
biblio
Research on Security Evaluation Technology of Intelligent Video Terminal
Submitted by grigby1 on Wed, 06/08/2022 - 1:55pm
Compositionality
Intelligent video terminal
Assessment
intelligent data
Resiliency
hospitals
Scalability
Transportation
testing
information security
Data Security
computer security
Production
data privacy
resilience
pubcrawl
Monitoring
security
biblio
Cybersecurity of healthcare IoT-based systems: Regulation and case-oriented assessment
Submitted by grigby1 on Thu, 04/21/2022 - 3:09pm
Advanced Security Assurance Case
ASAC
Assessment
assurance
CASE
Cloud Computing
Communication system security
computer security
Cybersecurity
Healthcare
Internet of Things
ISO standards
Medical services
requirement
biblio
Modelling Cyber-Risk in an Economic Perspective
Submitted by grigby1 on Mon, 04/18/2022 - 10:56am
machine learning
vulnerabilities
Training
Time series analysis
time-series
Security Risk Estimation
Scalability
Risk
resilience
pubcrawl
Metrics
Management
Adaptation models
Human Factors
econometrics
deep learning
Data mining
Cyber-security
bug-bounties
Biological system modeling
Assessment
Artificial Intelligence
Analytical models
biblio
Information Security Assessment On Court Tracking Information System: A Case Study from Mataram District Court
Submitted by aekwall on Wed, 04/13/2022 - 10:14am
security management
information security
pubcrawl
Resiliency
Government
ISO standards
Regulation
passwords
Assessment
CMMI
ISO/IEC 27001:2013
Mobile communication
SIPP
Damage Assessment
biblio
Assessment of Blockchain Technology Application in the Improvement of Pharmaceutical Industry
Submitted by grigby1 on Thu, 02/24/2022 - 12:21pm
Pharmaceutical
Assessment
blockchain
blockchain technology
data integrity
Human behavior
Industries
Medical services
patient safety
supply chain management
Privacy Policies
pubcrawl
Robustness
Safety
Saudi Arabia
Scalability
security
biblio
Leveraging Resilience Metrics to Support Security System Analysis
Submitted by aekwall on Fri, 02/04/2022 - 10:36am
Measurement
sensors
Data models
Perturbation methods
pubcrawl
Metrics
resilience
Sensor Systems
detection
security system
Adaptation models
Resiliency
Assessment
Geospatial analysis
multi-layer networks
biblio
Security Assessment for Zenbo Robot Using Drozer and mobSF Frameworks
Submitted by grigby1 on Thu, 02/03/2022 - 4:06pm
operating systems
robot operating systems security
Zenbo
forensic
Assessment
Human Factors
Systematics
Humanoid robots
android
Mobile handsets
tools
Linux
Resiliency
resilience
policy-based governance
pubcrawl
IoT
security
Computer hacking
collaboration
biblio
Assessing Anomaly-Based Intrusion Detection Configurations for Industrial Control Systems
Submitted by grigby1 on Tue, 03/30/2021 - 11:52am
information technology network
Scalability
risk quantification
Resiliency
resilience
pubcrawl
production engineering computing
Production
operational technology systems
maintenance engineering
maintenance
Local area networks
Intrusion Detection Systems
Intrusion Detection
integrated circuits
anomaly-based intrusion detection configurations
Industrial Control Systems
industrial control
ICS Anomaly Detection
ICs
Government
full-scale ICS test bed
Ethernet based interconnections
Electronic mail
cost reduction
control engineering computing
computer network security
Assessment
anomaly-based network IDS settings
biblio
Trustworthiness Assessment of Web Applications: Approach and Experimental Study using Input Validation Coding Practices
Submitted by aekwall on Mon, 12/07/2020 - 12:30pm
secure code
web applications
Web application
vulnerabilities
trustworthiness assessment
trustworthiness
software security
software quality
security vulnerabilities
security perspective
security of data
Assessment
quality model
pubcrawl
internet
input validation practices
input validation coding practices
feasible security practices results
composability
coding practices
assessment techniques
biblio
CVSS Metric-Based Analysis, Classification and Assessment of Computer Network Threats and Vulnerabilities
Submitted by aekwall on Mon, 07/01/2019 - 10:12am
CVSS-metric
vulnerability Similarity Measure
vulnerabilities
VSM
VACC
threats
Security Metrics
pubcrawl
Protocols
probability
network security tools
Network
Monitoring
Metrics
Measurement
analysis
CVSS metric-based VACC
CVSS metric-based dynamic vulnerability analysis classification countermeasure criterion
computer-based networks
computer security
computer science
computer networks
computer network threats
computer network security vulnerabilities
computer network security
common vulnerability scoring system metric-based technique
CNSVT
classification
Assessment
1
2
next ›
last »