Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
risk assessment
biblio
Deploying Privacy as a Service within a Cloud-Based Framework
Submitted by aekwall on Mon, 12/07/2020 - 11:33am
Cloud Computing
data privacy
Trusted Computing
pubcrawl
composability
privacy
feedback
risk assessment
trustworthiness
cloud
privacy violations
ATMOSPHERE Platform
cloud systems
cloud-based framework
data leakages
deployment environment
feedback control loop
good option
MAKE-K
MAPE-K control loop
PRIVAaaS
privacy regulations
service concepts
software toolkit
software-based
trustworthy cloud services
biblio
Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model Enhancement
Submitted by grigby1 on Fri, 11/20/2020 - 1:27pm
Access Control
access control policies management
access control policy
access control service
Anomalies Correlation
authorisation
Correlation
correlation links
Database Security
Databases
information system security
Information systems
model enhancement
policy-based governance
pubcrawl
RBAC
risk assessment
risk assessment approach
risk assessment model
risk management
Security Policies Analysis
security risks
Servers
biblio
Research on Operating Data Analysis for Enterprise Intranet Information Security Risk Assessment
Submitted by grigby1 on Tue, 11/17/2020 - 1:40pm
risk management
data analysis
pubcrawl
Metrics
Resiliency
computer network security
composability
resilience
intranets
enterprise intranet
enterprise intranet information security risk assessment
information security knowledge
Operating Data
operating data analysis
operating system logs
risk assessment
security relevant configurations
user operation logs
Operating systems security
biblio
Parametric Analyses of Attack-Fault Trees
Submitted by grigby1 on Tue, 10/06/2020 - 1:01pm
attack-fault trees
automata
automata theory
composability
Concurrency
connected devices
Cost accounting
CPS
cyber physical systems
cyber-physical systems
fault scenarios
fault trees
formal verification
imitator
Logic gates
Metrics
model-checker IMITATOR
parameter values
parametric analyses
parametric timed automata
parametric weighted timed automata
power plants
pubcrawl
resilience
Resiliency
risk analysis
risk assessment
Safety
safety engineering
security
security of data
tree-based formalism
trees (mathematics)
Unified modeling language
biblio
Risk Assessment of Industrial Internet System By Using Game-Attack Graphs
Submitted by aekwall on Mon, 08/17/2020 - 10:17am
security of data
security
Protocols
game theory
Resiliency
pubcrawl
composability
graph theory
internet
risk management
risk assessment
communication protocols
probability
risk analysis
industrial control
search engines
Predictive Metrics
Nash Equilibrium
attack graph
attack graphs
asset threat list
Attack Path
attack rule base
attribute attack graph
game-attack graph-based risk assessment model
industrial internet system
nondestructive asset profiling
open services
scan components
search engine keyword segment matching method
biblio
Multimodal, Multiuser Immersive Brainstorming and Scenario Planning for Intelligence Analysis
Submitted by grigby1 on Thu, 06/04/2020 - 10:47am
Analytical models
brainstorming
brainstorming tool
CISL
cognition
cognitive immersive software
cognitive immersive systems lab
collaboration
composability
cyber physical systems
Human Factors
IBM
immersive environment
immersive systems
intelligence analysis
multimodal interaction
multiuser Immersive brainstorming
Planning
planning (artificial intelligence)
privacy
pubcrawl
resilience
Resiliency
risk assessment
scenario planning
scenario planning advisor
Software
Task Analysis
tools
biblio
Risk Assessment Approach to Secure Northbound Interface of SDN Networks
Submitted by aekwall on Mon, 03/09/2020 - 10:16am
accurate risk estimation
application program interfaces
computer network management
computer network security
Human Factors
Metrics
network cost
network optimization tool
Northbound-API
pubcrawl
RAMSES
Resiliency
risk assessment
risk assessment approach
risk management
Scalability
SDN
SDN network administrators
secure Northbound interface
security
Security Risk Estimation
software defined networking
telecommunication traffic
traffic demand requests
biblio
Privacy Risk Assessment for Data Subject-Aware Threat Modeling
Submitted by aekwall on Mon, 03/09/2020 - 10:16am
Threat Modeling
security of data
Scalability
security
Data models
Resiliency
pubcrawl
privacy
Metrics
data flow analysis
Data protection
Analytical models
risk management
risk assessment
data privacy
risk analysis
Human Factors
Privacy Risk
privacy by design
Monte Carlo methods
GDPR
Context modeling
data flow diagram system models
data protection by design
data subject-aware privacy risk assessment model
data subject-aware threat modeling
General Data Protection Regulation
Monte Carlo simulations
privacy risk assessment
privacy threat modeling activities
risk estimation approach
threat modeling tool prototype
Security Risk Estimation
biblio
Decision Support System for Risk Assessment Using Fuzzy Inference in Supply Chain Big Data
Submitted by grigby1 on Mon, 01/27/2020 - 11:34am
Analytical models
Big Data
collaboration
composability
Decision Making
decision support system
Decision support systems
emerging association patterns
FIDSS mechanism
Fuzzy Inference DSS mechanism
Fuzzy logic
fuzzy reasoning
fuzzy set theory
Fuzzy sets
Human behavior
Human Factors
inference mechanisms
mamdani fuzzy inference
Metrics
organisation Big Data collection
organisational aspects
policy-based governance
production engineering computing
pubcrawl
resilience
Resiliency
risk assessment
risk Identification
risk management
Scalability
supply chain Big Data
supply chain management
supply chain risk assessment
supply chains
biblio
Understanding Security Requirements for Industrial Control System Supply Chains
Submitted by grigby1 on Tue, 01/21/2020 - 11:16am
supply chain security
Computer crime
control engineering computing
control system security
cyber-physical infrastructures
cyber-physical systems
Decision Making
human issues
industrial control
Industrial Control Systems
Industrial Control Systems Anomaly Detection
integrated circuits
Iran
malware
Natanz city
nuclear facility
organisational aspects
organizational aspects
Organizations
pubcrawl
resilience
Resiliency
risk assessment
risk decision-making
risk management
Scalability
security industrial control system supply chains
security requirements
Standards organizations
stuxnet attack
supply chain management
supply chain risk assessment
supply chains
1
2
3
4
5
next ›
last »