Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
supply chain management
biblio
Cloud supply chain resilience
Submitted by grigby1 on Wed, 03/08/2017 - 2:26pm
information and communication technologies
supply chains
supply chain theory
supply chain resilience concept
supply chain management
resilience
pubcrawl170112
outsourcing benefits
organisational resilience (OR)
organisational resilience
Cloud Computing
ICT services supply chain
ICT operational resilience
coordination mechanisms
Context
Computational modeling
cloud supply chain resilience
cloud supply chain (CSC) resilience
cloud computing environments (CCE)
biblio
Protecting endpoint devices in IoT supply chain
Submitted by grigby1 on Wed, 03/08/2017 - 2:26pm
IoT supply chain
uniquely identifiable embedded computing devices
Traceability
supply chains
supply chain security
supply chain management
security issues
security challenges
secure access control
RFID-enabled solution
RFID tag
radiofrequency identification
pubcrawl170112
production engineering computing
privacy challenges
privacy
authentication
IoT device authentication
Internet of Things (IoT)
Internet of Things
Internet infrastructure
internet
Hardware
endpoint device protection
Endpoint Device
data transfer
data privacy
control chip
communication efficiency
centralized database
authorisation
biblio
A variant of schnorr signature scheme for path-checking in RFID-based supply chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:26pm
pubcrawl170112
telecommunication security
supply chains
supply chain management
Supply Chain
Security analysis
Schnorr signature
RFID-based supply chains
RFID technology
RFID
radiofrequency identification
authentication
Protocols
privacy analysis
privacy
path-checking protocols
path-checking
modified schnorr signature scheme
Generators
data privacy
check reader
biblio
A methodology to improve the assessment of vulnerability on the maritime supply chain of energy
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
Oceans
worldwide maritime network
world traffic
vulnerability assessment
transportation possibilities
Transportation
supply chains
supply chain management
spatial structure
security
Sea measurements
raw materials
pubcrawl170112
Ports (Computers)
economic dependency
network modelling
merchant navy
maritime territories
maritime supply chain
maritime safety
maritime network
marine systems
marine communication
industrialized countries
graph theory
freight distribution
freight containers
freight containerization
biblio
Hardware Design and Verification Techniques for Supply Chain Risk Mitigation
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
integrated circuit design
Watermarking
supply chains
supply chain security risks mitigation
supply chain management
pubcrawl170112
overbuilding
metering
integrated circuits
concurrent checking
IC obfuscation
IC misusing
Hardware
Foundries
Fingerprinting
design automation
counterfeiting
concurrent engineering
biblio
On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
protocol-based clustering tag
telecommunication security
supply-chain management systems
supply chain management
Servers
Security analysis
security
RFID systems
RFID
radiofrequency identification
radio frequency identification
pubcrawl170112
Protocols
authentication
privacy
mathematical analysis
Intelligent systems
industrial environment
Indexes
healthcare monitoring and
delays
delay analysis
cryptography protocol
Cryptographic Protocols
cryptographic protocol
biblio
Designing a database encryption technique for database security solution with cache
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
Elliptic curves
database management software
database management systems
database security solution
Databases
DBMS
Decision Making
Elliptic curve cryptography
Elliptic Curve Cryptography(ECC)
database encryption technique
elliptical curve cryptography module
encryption
financial information
personal files
pubcrawl170112
public key cryptography
RSA
supply chain management
Data collection
cache storage
client details
company secrets
computer architecture
corporate data
corrupted data
customer service management
data availability
Advanced Encryption Standard(AES)
data consistency
data integrity
data loss
data management
data organization
data quality
data retrieval
database cache
biblio
A proven method for identifying security gaps in international postal and transportation critical infrastructure
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
supply chain management
resilince management
risk analysis
security
security gap identification
security risk mitigation
shipping processing facilities
ships
Standards organizations
pubcrawl170112
surface to-air missile system
Transportation
transportation critical infrastructure security
transportation processing facilities
United States Postal Inspection Service
UPU standards
USPIS
worldwide commerce
international scale
critical transportation services
field instrument
global supply chain
Inspection
Instruments
international community
international mail processing centers
international postal infrastructure
critical infrastructures
military aircraft
missiles
National security
Organizations
physical security
physical security assessment method
Postal services
biblio
Analyzing information security investment in networked supply chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:23pm
networked supply chains
Trusted Computing
trust risks
supply chains
supply chain management
socially optimal solutions
security breaches
security attacks
risk management
pubcrawl170112
organisational aspects
optimisation
optimal strategy
noncooperative game condition
Computer hacking
Investment
interdependent risks
information security risk
information security investment
information security
infectious risks
Games
game theory-based model
game theory
firms
equilibrium levels
Economics
biblio
Fuzzy Optimization of Automobile Supply Chain Network of Considering Risks
Submitted by grigby1 on Wed, 03/08/2017 - 1:56pm
fuzzy price
transportation costs
total profit risk minimization
supply chains
supply chain network
supply chain management
risks
risk management
pubcrawl170110
profitability
Pricing
optimization
optimisation
Industries
fuzzy set theory
Approximation methods
fuzzy optimization
Fuzzy
distribution centers
discretization points
discrete fuzzy problem
Cplex 12.6
continuous fuzzy problem
component suppliers
component plants
automotive components
automobiles
automobile supply chain network
automobile
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »