Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Organizations
biblio
Realizing A Composable Enterprise Microservices Fabric with AI-Accelerated Material Discovery API Services
Submitted by aekwall on Wed, 08/11/2021 - 2:51pm
microservices architecture
tools
Systematics
security
Scalability
Resiliency
pubcrawl
policy-based governance
Performance analysis
Organizations
API fabric
Metrics
material discovery
Internet-scale Computing Security
Human behavior
Fabrics
composable enterprise services
composability
Cloud Computing
biblio
Dataset Discovery in Data Lakes
Submitted by grigby1 on Thu, 08/05/2021 - 2:56pm
feature extraction
Organizations
pubcrawl
resilience
Resiliency
Scalability
Urban areas
metadata
Compositionality
Data discovery
indexing
Lakes
Metadata Discovery Problem
data wrangling
table search
biblio
A Hybrid Data Access Control Using AES and RSA for Ensuring Privacy in Electronic Healthcare Records
Submitted by grigby1 on Thu, 07/08/2021 - 2:37pm
Organizations
user privacy in the cloud
user privacy
Semi-Trusted Authority
Scalability
Rule Based Engine
Resiliency
resilience
Registers
public cloud
pubcrawl
outsourcing
Access Control
organization
Metrics
Engines
Designation
data privacy
data owners
Cloud Computing
cloud
Authorized Cloud
Audit request
Attributes
biblio
Preventing the Insider – Blocking USB Write Capabilities to Prevent IP Theft
Submitted by aekwall on Mon, 06/28/2021 - 12:41pm
composability
Data Breach
Drives
Image edge detection
Insider Risk
intellectual property
intellectual property security
Monitoring
Organizations
policy-based governance
pubcrawl
Resiliency
security
Universal Serial Bus
USB Drives
biblio
Automated Implementation of Windows-related Security-Configuration Guides
Submitted by grigby1 on Thu, 06/24/2021 - 11:26am
pubcrawl
Operating systems security
Resiliency
resilience
composability
Metrics
Automated Secure Software Engineering
Configuration Management
Data mining
Manuals
natural language processing
operating systems
Organizations
security
Task Analysis
biblio
A Comprehensive Cybersecurity Audit Model to Improve Cybersecurity Assurance: The CyberSecurity Audit Model (CSAM)
Submitted by grigby1 on Tue, 05/25/2021 - 2:34pm
Computer crime
cyber education
cyber physical systems
Cybersecurity
cybersecurity assurance
cybersecurity audit
cybersecurity audit model
cybersecurity controls
cybersecurity domains
cybersecurity education
Guidelines
information security
Organizations
privacy
pubcrawl
standards
biblio
A Multi-layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application
Submitted by grigby1 on Tue, 05/25/2021 - 2:20pm
Organizations
wireless sensor networks
taxonomy
Steel
security
SCADA
Resiliency
resilience
pubcrawl
Cross Layer Security
Multi layer Taxonomy
Industrial Internet of Things
Industrial Control Systems
iiot
composability
Complexity theory
attack
biblio
Distributed IoT Attestation via Blockchain
Submitted by grigby1 on Thu, 05/13/2021 - 2:07pm
IoT
security
Resiliency
resilience
Remote Attestation
pubcrawl
Protocols
Peer-to-peer computing
Organizations
attestation
Human behavior
Hardware
Fabrics
distributed systems
computer architecture
composability
blockchain
biblio
Analysis of the attack vectors used by threat actors during the pandemic
Submitted by grigby1 on Thu, 05/13/2021 - 12:21pm
Incident Response
threat actor
security
Scalability
Resiliency
resilience
pubcrawl
Pandemics
Organizations
malware
information security
threat vectors
Human behavior
Cyber Kill Chain
COVID-19
computer security
business continuity
Attack vectors
attack vector
analysis
privacy
Measurement
biblio
Network Attack Surface Simplification for Red and Blue Teams
Submitted by aekwall on Thu, 05/13/2021 - 11:34am
Organizations
Resiliency
pubcrawl
Metrics
Shape
tools
Clustering algorithms
Complexity theory
Scalability
Software algorithms
Surface treatment
attack surface
cluster analysis
Network Attack Surface
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »