Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
organizational aspects
biblio
Employing social network analysis to dark web communities
Submitted by grigby1 on Fri, 06/02/2023 - 3:32pm
pubcrawl
Analytical models
Computer crime
dark web
Data mining
directed graphs
Human behavior
Human Factors
Key nodes
organizational aspects
search engines
social interactions
social network analysis
social networking (online)
biblio
MobSF: Mobile Health Care Android Applications Through The Lens of Open Source Static Analysis
Submitted by aekwall on Sun, 10/16/2022 - 5:24pm
Software
Medical services
pubcrawl
Resiliency
Human behavior
composability
Cybersecurity
static analysis
Secure Software Development
Mobile handsets
Data Security
Regulation
static code analysis
Android applications
organizational aspects
biblio
Enforcing Corporate Governance's Internal Controls and Audit in the Cloud
Submitted by aekwall on Mon, 03/22/2021 - 12:06pm
Compositionality
Self-protection
organizational aspects
internal controls and audit process
Internal Controls and Audit functions
integrity guarantee
ICA functions
corporate governance
cloud-based services
business organizations
privacy guarantee
auditing
encryption audits
Selective Encryption
outsourcing
security of data
Predictive Metrics
business data processing
data privacy
process control
cloud-based solutions
Data protection
pubcrawl
Resiliency
security
Organizations
encryption
data access
Cryptography
Cloud Computing
biblio
Understanding Security Requirements for Industrial Control System Supply Chains
Submitted by grigby1 on Tue, 01/21/2020 - 11:16am
Scalability
organizational aspects
Organizations
pubcrawl
resilience
Resiliency
risk assessment
risk decision-making
risk management
organisational aspects
security industrial control system supply chains
security requirements
Standards organizations
stuxnet attack
supply chain management
supply chain risk assessment
supply chains
supply chain security
nuclear facility
Natanz city
malware
Iran
integrated circuits
Industrial Control Systems Anomaly Detection
Industrial Control Systems
industrial control
human issues
Decision Making
cyber-physical systems
cyber-physical infrastructures
control system security
control engineering computing
Computer crime
biblio
Balancing Organizational Incentives to Counter Insider Threat
Submitted by aekwall on Wed, 05/08/2019 - 8:47am
positive incentives
negative incentives
organisational aspects
organizational aspects
organizational context
organizational supportiveness
Organizations
perceived organizational support
Personnel
Monitoring
psychology
pubcrawl
resilience
security of data
sociotechnical systems
software engineering
traditional security practices
workforce management practices
Engagement
balanced combination
balances organizational incentives
balancing organizational incentives
best practices
computer security
contracts
dysfunctional management practices
employee welfare
authorisation
Human behavior
human resources management
insider threat
insider threat program
insider wrongdoing
Metrics
missing dimension
biblio
From Secure Business Process Modeling to Design-Level Security Verification
Submitted by grigby1 on Tue, 02/27/2018 - 1:28pm
socio-technical systems
pubcrawl
resilience
Resiliency
SecBPMN2
security
security engineering framework
security of data
security requirements
procedural system descriptions
Stakeholders
system design
system developers
Systems architecture
UML
UMLsec policies
Unified modeling language
Air gaps
organizational aspects
organisational aspects
modeling
Model transformation
Metrics
Human Factors
Human behavior
formal verification
Formal Specification
design-level security verification
composability
business process modeling security
business data processing
BPMN
air traffic management system
biblio
Combatting phishing: A holistic human approach
Submitted by BrandonB on Thu, 04/30/2015 - 12:31pm
security vulnerability
organizational aspects
Phishing
phishing security controls
security
security education
security education training and awareness
security gaps
security training
organisational aspects
social engineering
spoofed-Web sites
technological controls
technology acceptance model
Training
trusted reputation
unsolicited e-mail
fake warnings
ails
awareness programme
COBIT
Computer crime
computer science education
cyber criminals
design science principles
educational factors
agency theory
financial awards
holistic human approach
HOT elements
Human Factors
ISO
lax security behavior
Lead