Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Economics
biblio
Insider Threats and Cryptographic Techniques in Secure Information Management
Submitted by grigby1 on Tue, 12/12/2017 - 1:24pm
Human behavior
unauthorized leakage
strategic data splitting
semantic analysis
secure information management
Resiliency
pubcrawl
Protocols
policy-based governance
Metrics
Insider Threats
information management security
information management
Human Factors
authorisation
enterprise management processes
Economics
data reconstruction methods
Data protection
data analysis
Cryptography
Cryptographic Protocols
cryptographic data splitting algorithms
Companies
collaboration
cognitive systems
cognitive data analysis
business data processing
biblio
An Economic Alternative to Improve Cybersecurity of E-government and Smart Cities
Submitted by grigby1 on Wed, 08/02/2017 - 2:16pm
collaboration
Cybersecurity
E-Government
Economics
Electronic government
game theory
Government
Human behavior
Policy
pubcrawl
Resiliency
security and privacy
smart cities
Vulnerability
biblio
An analysis of XSS, CSRF and SQL injection in colombian software and web site development
Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
Human behavior
XSS
websites
Web sites
web security
web applications
SQL injection
SQL
software engineering
software development
Software
security protocols
Resiliency
pubcrawl
internet
Colombian companies
hacking protection
Hacking
Economics
Databases
CSRF
Cross Site Scripting attacks
Cross Site Scripting
Cross Site Request Forgery
Computer crime
composability
Colombian Web Site development
Colombian software development
Colombian organizations
biblio
Analyzing information security investment in networked supply chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:23pm
networked supply chains
Trusted Computing
trust risks
supply chains
supply chain management
socially optimal solutions
security breaches
security attacks
risk management
pubcrawl170112
organisational aspects
optimisation
optimal strategy
noncooperative game condition
Computer hacking
Investment
interdependent risks
information security risk
information security investment
information security
infectious risks
Games
game theory-based model
game theory
firms
equilibrium levels
Economics
biblio
2020 Cybercrime Economic Costs: No Measure No Solution
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
Computer crime
cyber security
cyber space
cyber-attacks
cybercrime economic cost
economic costs
Economics
government data processing
Measurement
Organizations
pubcrawl170109
Reliability
security of data
Stakeholders
biblio
Staffing for Security: Don't Optimize
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
botnets
computer security
Data Security
Economics
IT security employees
Organizations
Personnel
privacy
security
security of data
security threats
software development
staff allocation optimization
staffing
biblio
Research on cloud computing complex adaptive agent
Submitted by BrandonB on Fri, 05/01/2015 - 8:12am
Adaptation models
adaptive systems
Business
CAS theoretical framework
Cloud Computing
cloud computing complex adaptive agent
cloud computing environment simulation
cloud computing system
cloud computing technology
complex adaptive system
Complexity theory
Computational modeling
Economics
information technology
multi-agent systems
service agent
biblio
Reducing Mistrust in Agent-Human Negotiations
Submitted by BrandonB on Thu, 04/30/2015 - 1:37pm
Educational institutions
Intelligent systems
Joints
multi-agent systems
multiissue negotiation
face-to-face negotiation
Instruments
computational agent
Context
socially intelligent agent
Economics
online negotiation
software agents
Trusted Computing
agent-human negotiation
agent-human negotiations
online negotiation setting
socially intelligent agents
software agent
trusting individual
online interaction
biblio
Third-Party Web Tracking: Policy and Technology
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
security
Web sites
Web privacy
Web pages
Web innovation
user browsing activity tracking
third-party Web tracking
third-party Web sites
third-party tracking
social networking
advertising
privacy
History
fourth party Web measurement platform
Economics
Do Not Track
data privacy
Companies
analytics
file
Computer Security: Science, Engineering, Economics and a Bit of Reality
Submitted by TimTh on Mon, 11/15/2010 - 11:53am. Contributor:
Stefan Savage
Economics
Engineering
University of California San Diego
Academia
Presentation
Cyber Security
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »