Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information exchange
biblio
On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective
Submitted by aekwall on Thu, 04/08/2021 - 4:41pm
collaborative security
sensitive information
information exchange
security-related information
privacy loss
game-theoretic analysis
information theoretic security
collaboration gain
collaborative entities
Loss measurement
collaborative security schemes
information sharing process
multiple security entities
Quantitative information flow
quantitative information flow game perspective
quantitative information flow games
security-privacy tradeoff
security of data
security decisions
Games
collaboration
Intrusion Detection
cyber-attacks
Metrics
privacy
policy-based governance
pubcrawl
Human behavior
Resiliency
game theory
privacy concerns
data privacy
Scalability
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
Interledger for the Industrial Internet of Things
Submitted by grigby1 on Tue, 12/01/2020 - 2:01pm
information exchange
socio-economic effects
smart grid security
pubcrawl
production engineering computing
manufacturing systems
ledger technology
Internet-of-Things devices
Internet of Things
Information systems
blockchain
Industrial Internet of Things
industrial internet
industrial information systems
human trust
Human behavior
hierarchical information flow
Distributed Ledger Technology
distributed ledger technologies
biblio
Secure Information Exchange in Defining the Location of the Vehicle
Submitted by grigby1 on Mon, 11/02/2020 - 12:10pm
location determination
Wireless fidelity
Vehicular Communication
telecommunication security
smart roads
security protocols
security
Roads
Resiliency
resilience
radionavigation
pubcrawl
Protocols
Metrics
automobiles
locating
Internet of Vehicles
information security
information exchange
Human Factors
Global Positioning System
Electric Vehicles
electric vehicle market
effective secure communication protocol
car control system
Base stations
base station
biblio
Trust-Based Distributed Kalman Filter Estimation Fusion under Malicious Cyber Attacks
Submitted by grigby1 on Fri, 06/19/2020 - 11:48am
sensor networks
pubcrawl
replay attacks
resilience
Resiliency
Scalability
security
security of data
sensor fusion
Policy-Governed Secure Collaboration
state estimation
trust-based distributed Kalman filter estimation fusion
trust-based distributed processing frame
Trusted Computing
trusted nodes
truth discovery
wireless sensor networks
information exchange
Cyber Attacks
distributed cooperative localization
Distributed databases
Distributed Kalman filter
distributed processing
Dynamic state estimation
False Data Injection
false trust
Covariance matrices
Kalman filters
malicious attacks
malicious cyber attacks
malicious network attack
measurement errors
neighbor nodes
policy-based governance
biblio
A System Architecture of Cybersecurity Information Exchange with Privacy (CYBEX-P)
Submitted by grigby1 on Fri, 04/03/2020 - 12:33pm
cybersecurity information exchange
versatile information exchange platform
STIX
shared threat data
shared data
privacy-preserving mechanisms
privacy preservation
information sharing
information management
information exchange platform
information exchange
CYBEX-P
cybersecurity techniques
cybersecurity information sharing platform
cybersecurity information exchange with privacy
privacy
Cybersecurity
cyber-information exchange
cyber threats
cyber defense
Privacy Policies
computer security
Databases
Scalability
data privacy
Human behavior
pubcrawl
Servers
Organizations
security of data
biblio
Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators
Submitted by aekwall on Mon, 02/17/2020 - 2:33pm
IoC-centric cyber security sensor networks
design decisions
design principles
distributed cyber security sensor networks
effective cyber defence
exchange process
extensive human involvement
indicator distribution
information brokers
information exchange
cyber security sensor networks
national authorities
national cyber security
national cyber security centres
national cyber security sensor networks
scanning process
security data
security information
small-scale demonstrators
vital recommendations
composability
computer network security
Cryptography
Organizations
malware
Task Analysis
invasive software
Resiliency
Human behavior
pubcrawl
Computer crime
Metrics
Industries
Attack vectors
indicators of compromise
Feeds
sensor network
sensor security
National security
confidential indicators
biblio
SOA Approach - Identity and Access Management for the Risk Management Platform
Submitted by grigby1 on Tue, 01/21/2020 - 11:35am
multilayered approach
User Management
taxes
tariffs
SOA approach
SOA
service-oriented architecture
security
Scalability
risk management system
Risk Management platform
risk management
resilience
pubcrawl
Protocols
access management
international trade
information exchange
imports
Identity management
Human behavior
goods transit
goods dispatch data processing
export
duties
decoupled microservices
customs administrations
checking prohibitions
authorization
authentication
biblio
Static analysis for web service security - Tools amp; techniques for a secure development life cycle
Submitted by grigby1 on Tue, 03/07/2017 - 1:43pm
Web Application Security
SOA
SOAP
software bugs
Software verification
Source code analysis
Static Analysis Tool
static code analysis
strategic components
ubiquitous IoT
vulnerabilities detection
vulnerability identification
Simple object access protocol
web applications
Web service security
web services
Web services guidelines
Web Services Security
WS-SecureConversation
WS-security
XML
XML encryption
XML signature
program verification
critical national infrastructure
Cryptography
dynamic analysis
enterprise software ecosystem
Heartbleed
information exchange
mission critical API
Mobile Applications
Open Web Application Security Project
Penetration Testing
program diagnostics
Computer crime
public deployments
public sector infrastrucure development life cycle
Secure Software Development
security challenges
Security Code Review
service development paradigm
service oriented architecture
service-oriented architecture
services security
Shellshock
biblio
"Security information sharing for the polish power system"
Submitted by abfox on Tue, 02/14/2017 - 2:24pm
multi-agent systems
Substations
substation
Stakeholders
security of data
SCADA systems
SCADA system
pubcrawl170101
power system security
power generation
power engineering computing
Polish power system
multiagent architecture
anonymity
information sharing security
information sharing
information security
information management
information exchange
information and communication technology
Electric Grid
distributed control system
distributed control
cybersecurity technology
cyberattack
Computer crime
1
2
next ›
last »