Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
risk management
biblio
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks
Submitted by aekwall on Mon, 01/25/2021 - 12:02pm
security
Protocols
Software
computer architecture
Resiliency
pubcrawl
composability
Databases
tools
risk management
network attacks
Predictive Metrics
attack graph
attack graphs
MulVal
network protocols
biblio
A Theoretical Review: Risk Mitigation Through Trusted Human Framework for Insider Threats
Submitted by grigby1 on Tue, 12/01/2020 - 12:59pm
cyclic process
enterprise risk management activities
Human behavior
human trust
Insider Threats
insider threats risk
on-going process
People Process and Technology
Personnel
potential employees
pubcrawl
risk management
risk mitigation
security of data
software engineering
Trusted Computing
trusted human framework
biblio
Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model Enhancement
Submitted by grigby1 on Fri, 11/20/2020 - 1:27pm
Access Control
access control policies management
access control policy
access control service
Anomalies Correlation
authorisation
Correlation
correlation links
Database Security
Databases
information system security
Information systems
model enhancement
policy-based governance
pubcrawl
RBAC
risk assessment
risk assessment approach
risk assessment model
risk management
Security Policies Analysis
security risks
Servers
biblio
Research on Operating Data Analysis for Enterprise Intranet Information Security Risk Assessment
Submitted by grigby1 on Tue, 11/17/2020 - 1:40pm
risk management
data analysis
pubcrawl
Metrics
Resiliency
computer network security
composability
resilience
intranets
enterprise intranet
enterprise intranet information security risk assessment
information security knowledge
Operating Data
operating data analysis
operating system logs
risk assessment
security relevant configurations
user operation logs
Operating systems security
biblio
Implementing Cyber Resilient Designs through Graph Analytics Assisted Model Based Systems Engineering
Submitted by aekwall on Mon, 11/16/2020 - 1:51pm
security of data
Big Data
pubcrawl
graph theory
tools
Cybersecurity
Analytical models
risk management
computer security
Risk
systems engineering
resilience
cyber resilience
centralized MBSE database
complex models
cyber resilient designs
decision analysis methods
design lifecycle
engineering cyber resilient systems
graph analytic assisted model
graph analytic methods
graph analytics
inter-element relationships
MBSE
MBSE tools
mitigate cyber risk
Model-based Systems Engineering
resilience requirements
structured system engineering methodology
Resiliency
Resilient Security Architectures
biblio
A Context-Aware, Confidence-Disclosing and Fail-Operational Dynamic Risk Assessment Architecture
Submitted by aekwall on Mon, 11/16/2020 - 1:50pm
Safety
security of data
computer architecture
pubcrawl
collision avoidance
risk management
optimisation
Measurement
resilience
Automotive engineering
automotive systems
context-awareness
vehicle dynamics
acceptable risk
automotive collision risk metrics
confidence-disclosing risk assessment architecture
confidence-disclosure
Dynamic Risk Assessment
Dynamic Risk Management
fail-operational Dynamic Risk Assessment architecture
manually controlled stand-alone systems
safety perspective
Resiliency
Resilient Security Architectures
biblio
CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems
Submitted by grigby1 on Wed, 11/04/2020 - 12:35pm
API interoperability issues
Attack Surfaces
auditing
BrokerMonkey
bucket policy misconfigurations
Cascading style sheets
chaos engineering failure injection strategies
Cloud Audit
cloud auditing schemes
Cloud Computing
cloud security system
cloud storage broker systems
cloud storage services
Cloud-Security
CloudRAID
Common Configuration Scoring System
Computational modeling
continuous snapshotting mechanism
CSB resource audits
CSBAuditor
fault tolerance
fault tolerant computing
malicious activities
malicious insider threats
Measurement
Metrics
metrics testing
multicloud strategy
open systems
proactive security risk analysis
pubcrawl
reference CSB system
risk analysis
risk management
Secure Configuration
security
security complexities
Security Metrics
security of data
security risk assessment
storage management
biblio
Improving Communication in Risk Management of Health Information Technology Systems by means of Medical Text Simplification
Submitted by aekwall on Mon, 10/12/2020 - 10:32am
Scalability
data privacy
Human behavior
pubcrawl
text analysis
risk management
Human Factors
health care
medical information systems
patient care
diseases
communication problem
communication problems
health information technology systems
HITS
IEC 80001-1
medical professionals
medical terminology
Medical Terminology Simplification
medical terms
medical text simplification
nonclinical risk management
patient safety
patient security
Expert Systems and Privacy
biblio
Security Assessment of Dynamic Networks with an Approach of Integrating Semantic Reasoning and Attack Graphs
Submitted by aekwall on Mon, 10/05/2020 - 10:53am
security of data
enterprise networks
Ontologies
security
network security
Resiliency
pubcrawl
composability
graph theory
Mobile handsets
Metrics
tools
Decision Making
risk management
cyber-attacks
ontologies (artificial intelligence)
security assessment
security problems
cognition
Semantics
inference mechanisms
attack graph
security knowledge
Inference algorithms
integrating semantic reasoning
ontology- and graph-based approach
risk assessment experience
scalable security analysis
Security Ontology
semantic reasoning
test networks
Dynamic Networks and Security
biblio
Stateless Security Risk Assessment for Dynamic Networks
Submitted by aekwall on Mon, 10/05/2020 - 10:53am
computer network security
Cloud Computing
Conferences
security
software defined networking
Resiliency
pubcrawl
composability
Metrics
risk management
NIST
computer science
security posture
network configurations
dynamic networks
emerging networking technologies
Emerging Networking Technology
Graphical security modeling
network states
security overview
stateless security risk assessment
unpredictable security postures
Dynamic Networks and Security
1
2
3
4
5
6
7
8
9
…
next ›
last »