Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Government
biblio
A traditional medicine intellectual property protection scheme based on Hyperledger Fabric
Submitted by grigby1 on Thu, 09/07/2023 - 3:58pm
Law
permissioned network
judicial protection
digital depository
consortium Blockchain
Hyperledger Fabric
distributed ledger
patents
Government
security
composability
privacy
intellectual property
Throughput
Resiliency
resilience
policy-based governance
pubcrawl
biblio
Factors Affecting Information Assurance for Big Data
Submitted by grigby1 on Fri, 08/25/2023 - 10:33am
Big Data
Human Factors
Government
software engineering
Systematics
Compositionality
Data mining
composability
Information Assurance
information security
security
information technology
Scalability
Resiliency
resilience
collaboration
policy-based governance
Metrics
Human behavior
pubcrawl
biblio
The Promise and Perils of Allied Offensive Cyber Operations
Submitted by grigby1 on Fri, 06/30/2023 - 2:34pm
pubcrawl
Human behavior
resilience
Resiliency
Scalability
Planning
cyberattack
Government
Cyberspace
Presses
Costs
Deterrence
Behavioral sciences
offensive cyber operations
NATO
biblio
The importance of cyber security education in digitalization and Banking
Submitted by grigby1 on Fri, 06/09/2023 - 2:16pm
Government
Vulnerable Digital
Internet safety
policy governance
Human Factors
Cybercrime
military computing
Cyberspace
education
cybersecurity education
pubcrawl
cyber-attacks
resilience
Complexity theory
composability
Computers
internet
Scalability
Resiliency
Human behavior
biblio
Design and Implementation of Industrial Control Cyber Range System
Submitted by grigby1 on Fri, 06/09/2023 - 2:01pm
Government
Vulnerability Exploits
Industrial Control Cyber Range
cyberattack
cyber range
policy governance
Human Factors
Cyberspace
Web servers
education
cybersecurity education
cyber security
operating systems
resilience
network architecture
composability
industrial control
Scalability
Resiliency
Human behavior
pubcrawl
biblio
Diverse Approaches Have Been Presented To Mitigate SQL Injection Attack, But It Is Still Alive: A Review
Submitted by grigby1 on Thu, 05/11/2023 - 4:47pm
malicious code
SQLIA
SQL injection attack
review
Resiliency
Mobile Security
command injection attacks
web security
Government
SQL injection
Market research
machine learning
Cybersecurity
Vulnerability
Structured Query Language
application security
Data Security
composability
Companies
resilience
Metrics
pubcrawl
biblio
Cybers Security Analysis and Measurement Tools Using Machine Learning Approach
Submitted by grigby1 on Fri, 04/28/2023 - 3:52pm
Cryptography
machine learning
machine learning algorithms
security
pubcrawl
Hardware
internet
composability
Artificial Intelligence
Compositionality
learning (artificial intelligence)
Government
Artificial Intelligence (AI)
computational intelligence
machine learning (ML)
and cyber security
biblio
A Traceability Method for Bitcoin Transactions Based on Gateway Network Traffic Analysis
Submitted by grigby1 on Fri, 03/31/2023 - 11:28am
Logic gates
pubcrawl
Human behavior
Scalability
telecommunication traffic
Virtual private networks
bitcoin
Distributed databases
Government
Weapons
Human Factors
Traffic analysis
Bitcoin transactions
Traceability Method
bitcoin security
biblio
Ransomware Detection and Classification Strategies
Submitted by grigby1 on Fri, 03/17/2023 - 12:04pm
encryption
machine learning
pubcrawl
Metrics
resilience
Resiliency
Computer crime
Cybersecurity
composability
Forensics
Government
Ransomware
biblio
Study on Systematic Ransomware Detection Techniques
Submitted by grigby1 on Fri, 03/17/2023 - 11:59am
Government
osquery
open-source EDR
Open Source hids SECurity (OSSEC)
Google rapid response
endpoint detection and response (EDR)
ransomware detection
Communications technology
Ransomware
Internet of Things
Systematics
Linux
composability
Resiliency
resilience
Metrics
pubcrawl
feature extraction
1
2
3
4
5
6
7
8
9
…
next ›
last »