Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Government
biblio
On Enabling Smart Government: A Legal Logistics Framework for Future Criminal Justice Systems
Submitted by grigby1 on Wed, 08/02/2017 - 2:17pm
and penal law
collaboration
Cybersecurity
E-Government
effectivity
efficiency
Electronic government
Government
Human behavior
law enforcement
legal design
open justice
Policy
pubcrawl
Resiliency
smart governance
biblio
Cyber Security in Governments Around the World: Initiatives and Challenges
Submitted by grigby1 on Wed, 08/02/2017 - 2:16pm
collaboration
cyber security
cyber security initiatives
cyber security policy
Cybersecurity
E-Government
Electronic government
Government
Human behavior
information security
international collaboration
Policy
pubcrawl
Resiliency
biblio
An Economic Alternative to Improve Cybersecurity of E-government and Smart Cities
Submitted by grigby1 on Wed, 08/02/2017 - 2:16pm
collaboration
Cybersecurity
E-Government
Economics
Electronic government
game theory
Government
Human behavior
Policy
pubcrawl
Resiliency
security and privacy
smart cities
Vulnerability
biblio
The Honey Community: Use of Combined Organizational Data for Community Protection
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
Honey Pot
would-be attackers
US military infrastructure
US CYBERCOM
United States
security of data
security
pubcrawl170114
Ports (Computers)
organisational aspects
multiorganization concept
Monitoring
honeypots
honeynets
Cities and towns
honey net
honey community
Government
geographic boundary
fictitious community
DHS
Cyberdefense
cyber frontier
critical infrastructures
critical cyber infrastructure
community protection
Communities
combined organizational data
biblio
Cybersecurity challenges for Bhutan
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
Hacking
Viruses (medical)
viruses
spamming
security of data
pubcrawl170109
Phishing
organisational aspects
national media
internet
information and communications technologies
ICT developing country
Bhutan government organisations
government reports
government organisations
government data processing
Government
cybersecurity management
cybersecurity incidents
Cybersecurity
cyber threats
Computers
Computer crime
biblio
Comparative analysis of Governmental Countermeasures to cyber attacks
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
ISAO
US government
United States
strengthening national cyber security posture initiative
South Korea
Sony
security of data
sanctions EO
retaliatory action
pubcrawl170109
presidential secretary
North Korea
ministry of industry
Law
KHNP
Comparative Analysis
Interviews
internet
information sharing EO
Inductors
governmental countermeasures
Government
cyber-attacks
cyber security response capability
Cyber incident
Cyber Attacks
CTIIC
control tower
Computer hacking
Computer crime
biblio
"An imperceptible watermarking technique for copyright content using discrete cosine transformation"
Submitted by grigby1 on Tue, 02/14/2017 - 12:55pm
Government
Watermarking
pubcrawl170102
image watermarking
image retrieval
image protection scheme
image compression
Image coding
IDCT
government sector
government data processing
Computers
frequency-domain analysis
frequency domain
encryption
discrete cosine transforms
discrete cosine transformation
digital watermarking scheme
DCT
Data protection
copyright content
copyright
biblio
"Persistent threat pattern discovery"
Submitted by abfox on Tue, 02/14/2017 - 12:36pm
Government
security of data
pubcrawl170101
persistent threat pattern discovery
persistent threat identification
Persistent Threat (PT)
network data
IP networks
Intrusion Detection Systems
Intrusion Detection
advanced persistent threat
frequent pattern discovery
Data mining
cyber-attack
association rules
Association Rule Mining (ARM)
association rule mining
arm
APT
Advanced Persistent Threat (APT)
biblio
Re-engineering Cybersecurity Education in the US: An Analysis of the Critical Factors
Submitted by BrandonB on Wed, 05/06/2015 - 10:48am
Industries
US government
student success factors
security of data
school programs
programmatic factors
NSA
NIST
NICE effort
National Security Agency
National Initiative for Cybersecurity Education
information security
CAE program
Government
Educational institutions
education systems
DHS
Department of Homeland Security
cybersecurity education re-engineering
cyber security professionals
critical factors analysis
computer security
computer science education
biblio
Ethics behind Cyber Warfare: A study of Arab citizens awareness
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
ethics
technological research centers
security systems
scientific research centers
personal information
offence
military war
military computing
Law
information technology
government data processing
Government
Arab citizens awareness
ethical aspects
despotic government plans
defense
cyber warfare
cyber war
cyber security
cyber attack
cyber army
Computers
Computer hacking
Computer crime
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »