Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Government
biblio
A New Security Approach in Telecom Infrastructures: The RESISTO Concept
Submitted by aekwall on Mon, 11/16/2020 - 2:57pm
Telecommunications
Resilient Security Architectures
telecom infrastructures
risk mitigation
RESISTO H2020 EU-funded project
holistic situation awareness
extreme weather events
criminal attacks
natural disasters
disasters
security approach
Communications
threats
security
resilience
5G mobile communication
Software Architecture
Government
Companies
vulnerabilities
pubcrawl
Resiliency
critical infrastructures
critical infrastructure
security of data
biblio
Research on Governmental Data Sharing Based on Local Differential Privacy Approach
Submitted by grigby1 on Fri, 10/16/2020 - 11:24am
information sharing
statistical data
statistical analysis
sharing statistics
Resiliency
resilience
pubcrawl
private blockchain
Privacy-preserving
privacy protection models
privacy disclosure
privacy
policy-based governance
Peer-to-peer computing
local differential privacy
blockchain
information management
governmental departments
governmental data sharing
government information resources
government departments
government data processing
Government
e-government applications
E-Government
differential privacy
data sharing
data privacy
Cybersecurity
collaboration
biblio
Total e-Governance: Pros Cons
Submitted by grigby1 on Fri, 10/16/2020 - 11:22am
good governance
security
Resiliency
resilience
pubcrawl
politics
political turmoil
policy-based governance
internet
information technology
government data processing
Government
Big Data
finance
ERP
economical turmoil
E-Government
E-Governance
Databases
data center
Cybersecurity
computer security
collaboration
biblio
Identity theft on e-government/e-governance digital forensics
Submitted by grigby1 on Fri, 10/16/2020 - 11:22am
Neural networks
fraudulent transactions
genetic algorithms
Government
government data processing
governments
identity theft
internet
Law
malicious online activity
fraud
policy-based governance
product reviews
pubcrawl
resilience
Resiliency
system intrusions
time 13.0 month
user anonymity
Cybercrime
collaboration
Computer crime
corporate users
credit card fraud
credit card transactions
Credit cards
credit transactions
cyber-threats
blockchain technology
Cybersecurity
cyberspace-low entry barriers
Digital Forensics
E-Governance
E-Government
electronic commerce
Electronic government
financial fraud
biblio
Internet of Things: An Analysis and Proposal of White Worm Technology
Submitted by grigby1 on Fri, 08/28/2020 - 11:51am
invasive software
white worm technology
security
Scalability
Resiliency
resilience
pubcrawl
Metrics
malware
IoT devices
attack surface
Internet of Things devices
Internet of Things
infiltrating malware
hackers
Grippers
Government
computer network security
Companies
biblio
A Scalable (\$\textbackslashtextbackslashalpha, k\$)-Anonymization Approach using MapReduce for Privacy Preserving Big Data Publishing
Submitted by grigby1 on Fri, 08/07/2020 - 3:47pm
big data privacy
Velocity of data
timely anonymization
scenarios efficient anonymization
Scalable k-Anonymization approach
Scalable k-Anonymization (SKA)
scalable anonymization approach
Publishing
privacy preserving big data publishing
privacy preserving approaches scalability
MapReduce based Anonymization (MRA)
k-anonymity
data publishing approaches
Credit cards
security of data
anonymity
AI
Government
Scalability
Big Data
privacy issues
privacy
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Intellectual Property Protection for AI-Related Inventions in Japan
Submitted by grigby1 on Thu, 07/30/2020 - 1:50pm
computer technology
ip protection
Technological innovation
patents
patent examination guidelines
patent eligibility review
Patent Eligibility
patent analysis
Japanese patent office
Japan's artificial intelligence technology
Invention
Intellectual Property Protection
intellectual property offices
Government
learning (artificial intelligence)
computer related invention
artificial intelligence related inventions
AI-related inventions
Law
composability
Artificial Intelligence
Guidelines
Software
Resiliency
resilience
policy-based governance
pubcrawl
biblio
Performance Evaluation of Intrusion Detection Streaming Transactions Using Apache Kafka and Spark Streaming
Submitted by aekwall on Mon, 07/27/2020 - 12:14pm
cybersecurity intrusion detection
Sparks
Real-Time Decision Making
intrusion tolerance
Processing time
Big Data Analytics
apache kafka
Apache Spark Streaming
complex attacks
performance evaluation
extremely competitive financial market
high-level protection
intrusion detection streaming transactions
intrusion detection system
massive Internet-based services
short period time
Spark Streaming
stream data
machine learning
security of data
Big Data
real-time systems
Resiliency
pubcrawl
composability
internet
Decision Making
Intrusion Detection
telecommunication traffic
data analysis
Government
Data mining
fault tolerant computing
network traffic
parallel processing
biblio
Measuring the Effectiveness of Network Deception
Submitted by grigby1 on Fri, 05/15/2020 - 11:56am
Network reconnaissance
uncertainty
target network
software-defined networking
software defined networking
SDN-based deception system
Scalability
Resiliency
resilience
reconnaissance surface
Reconnaissance
pubcrawl
network-based deception
network traffic
Bayes methods
Network Deception
measurement uncertainty
KL-divergence
IP networks
inference mechanisms
Government
cyber reconnaissance
cyber defensive system
cyber deception strategies
computer network security
Computer crime
belief system
Bayesian inference method
biblio
Measuring the Information Security Awareness Level of Government Employees Through Phishing Assessment
Submitted by grigby1 on Fri, 04/10/2020 - 12:36pm
information security awareness
unsolicited e-mail
pubcrawl
phishing simulation
phishing assessment
Phishing
Personnel
password
knowledge approach
knowledge and behavioral approach
information security instruments
information security awareness level
behavior approach
Indonesia
Human Factors
Human behavior
government information security
government employees
government data processing
Government
employees information security awareness
Directorate General of ABC
DG ABC employees
Computer crime
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »