Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Organizations
biblio
Managing Information and Network Security using Chaotic Bio Molecular Computing Technique
Submitted by grigby1 on Fri, 04/14/2023 - 4:01pm
Organizations
pubcrawl
Metrics
resilience
Software
network security
Scalability
privacy
DNA
chaotic cryptography
Resiliency
Costs
Bio Molecular
Chaotic Key series
molecular computing
biblio
A Step Towards Improvement in Classical Honeypot Security System
Submitted by grigby1 on Fri, 03/31/2023 - 11:17am
Data Security
Medium Interaction Honeypot
Low Interaction Honeypot
High Interaction Honeypot Security
Resiliency
big data security in the cloud
apache spark
Technological innovation
parallel processing
machine learning
Big Data
Scalability
network security
resilience
Metrics
pubcrawl
Organizations
biblio
Accuracy Analysis for Predicting Human Behaviour Using Deep Belief Network in Comparison with Support Vector Machine Algorithm
Submitted by grigby1 on Fri, 03/31/2023 - 8:28am
belief networks
Predictive models
Organizations
Support vector machines
pubcrawl
Metrics
Analytical models
Computational modeling
computer science
prediction
computer vision
support vector machine
classification
human behaviour
Novel Deep Belief Network
biblio
Critical Data Security Model: Gap Security Identification and Risk Analysis In Financial Sector
Submitted by grigby1 on Fri, 03/17/2023 - 12:13pm
Big Data
Data Breach
Bank
relational database security
PII
Market research
Access Control
Data Security
composability
relational databases
Data models
Analytical models
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Organizations
biblio
PRIDE: A Privacy-Preserving Decentralised Key Management System
Submitted by aekwall on Fri, 03/03/2023 - 10:52am
blockchain
proofs of knowledge
Privacy-preserving
ERTMS
Rail transportation
Forensics
Europe
key management
Performance analysis
Organizations
Human behavior
Resiliency
Metrics
Scalability
pubcrawl
Public key
Conferences
biblio
Industrial Network Attack Vulnerability Detection and Analysis using Shodan Eye Scanning Technology
Submitted by grigby1 on Fri, 03/03/2023 - 9:23am
Compositionality
Shodan Eye
Linux Operating System Security
Vulnerability Analysis
Kali Linux
Reconnaissance
Software algorithms
operating systems
resilience
Organizations
Linux
network security
composability
Industries
privacy
Resiliency
Metrics
pubcrawl
biblio
Holistic Assurance Case for System-of-Systems
Submitted by grigby1 on Fri, 02/17/2023 - 5:41pm
Hazards
Uncertainty in Performance
UAS
UAM
Through-life Assurance Case
Safety Performance Indicators
Safety Continuum
Performance Based Assurance Case
Goal-based regulatory Oversight
Epistemic Safety
dynamic systems
autonomous systems
Aircraft manufacture
Acceptable Safety
software assurance
Organizations
Stakeholders
supply chains
AI
complexity
Standards organizations
certification
Ecosystems
Scalability
Safety
Resiliency
resilience
pubcrawl
machine learning
biblio
STADS: Security Threats Assessment and Diagnostic System in Software Defined Networking (SDN)
Submitted by grigby1 on Fri, 02/17/2023 - 5:25pm
software reliability
controller.
computer network reliability
threat assessment
OpenFlow
data plane
control plane
SDN security
parallel processing
machine learning
SDN
Big Data
Scalability
security
Resiliency
resilience
pubcrawl
Organizations
biblio
Sandbox Integrated Gateway for the Discovery of Cybersecurity Vulnerabilities
Submitted by grigby1 on Fri, 02/17/2023 - 5:11pm
Phishing
email server
Email gateway
policy governance
sandbox
sandboxing
malware
Telecommunications
Electronic mail
Logic gates
Trojan horses
composability
pubcrawl
Servers
Organizations
Engines
collaboration
biblio
A Review of Android and iOS Operating System Security
Submitted by grigby1 on Fri, 02/17/2023 - 5:11pm
ios
privacy threat
mobile device security
memory randomization
isolation
application sandboxing
policy governance
sandboxing
Memory
Mobile communication
encryption
android
operating systems
Mobile Applications
composability
pubcrawl
security
Organizations
collaboration
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »