Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Organizations
biblio
The Method of Assessing the Level of Compliance of Divisions of the Complex Network for the Corporate Information Security Policy Indicators
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
Information systems
the ratio of Pareto
the Hamming distance
the accounts of the Board
Standards organizations
security of data
risk minimization
risk management
ranking of the values of indicators
pubcrawl
policy-based governance
Policy Based Governance
Organizations
maximin and minimax procedures
collaboration
Information services
information security
Games
decision-making
Decision Making
criteria
corporate information system
corporate information security policy requirements
corporate information security policy indicators
compliance level assessment
complex networks
complex network
comparative assessment
biblio
Need of Private and Public Sector Information Security
Submitted by grigby1 on Fri, 04/03/2020 - 12:03pm
private buildings
Intel
Intelligent systems
Internet of Things
knowledge based systems
man in middle
Organizations
personnel security
Policy Based Governance
Portable computers
information technicians
private sector information security
pubcrawl
public sector information security
sensitive information
sentinel systems
smart information security Intel processes
Standards organizations
virtual data tables
Data protection
Airports
AS-IS office system
authorisation
biometric
biometrics (access control)
Buildings
collaboration
conveyor belts
data entry-exit log
airport like security with digital boxes
digital bar-coded air port
digital bar-coded conveyor boxes
evaes-dropping
government buildings
government data processing
government offices
information security
information stealing
biblio
QRStream: A Secure and Convenient Method for Text Healthcare Data Transferring
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
cyber physical systems
text healthcare data transferring
QRStream
healthcare organization
healthcare activities
health information
health data delivery
health awareness
electronic health data transferring
privacy problems
QR codes
health care
Payloads
security problems
security of data
text analysis
Libraries
metadata
Decoding
Cryptography
pubcrawl
Resiliency
Organizations
Medical services
electronic health records
data privacy
Servers
biblio
Privacy-Enabled Recommendations for Software Vulnerabilities
Submitted by aekwall on Mon, 03/23/2020 - 1:30pm
recommender systems
vulnerability profiles
vulnerability prioritization data
software vulnerabilities
software reliability
Software
slow process
SGX
security of data
security
Scalability
Resiliency
Complexity theory
recommender system
recommender
pubcrawl
privacy-enabled recommendations
privacy
Organizations
malicious operator
Human Factors
data privacy
data integrity
costly process
biblio
An Approach for Sending a Confidential Message to the Restricted Users in Defence Based Organization
Submitted by grigby1 on Wed, 03/18/2020 - 12:27pm
group key
Secure File Sharing
resilience
Resiliency
pubcrawl
user list
untrusted cloud storages
third-party applications
storage node
spammer
security problem
secure platform
profiling users
personal information
group member communication
Group Manager
Cryptography
file transfer
file sharing process
dynamic broadcasting encryption
defense-based organization
defense networks
defense network
defence based organization
decryption
confidential message
storage management
Organizations
Public key
Cloud Computing
Access Control
encryption
biblio
Security Evaluation Methodology for Software Defined Network Solutions
Submitted by grigby1 on Wed, 03/18/2020 - 11:59am
SDN architecture
software-defined networking
software defined networking
software defined network solutions
security-related features
security evaluation methodology
Security Evaluation
security controls
security assessment
SDN solutions
SDN security
SDN controllers
SDN choice
authentication
Scalability
Resiliency
resilience
pubcrawl
Organizations
Object recognition
NIST 800-53
Cryptography
control systems
computer networking
computer network security
comprehensive methodology
biblio
Traceability of Counterfeit Medicine Supply Chain through Blockchain
Submitted by grigby1 on Thu, 03/12/2020 - 12:09pm
pharmaceutical industry
Traceability
supply chains
supply chain security
supply chain management
Scalability
Safety
Resiliency
resilience
quick response code security
QR codes
Public key
pubcrawl
production engineering computing
active pharmaceutical ingredients
Organizations
medical supply chain
Human behavior
end-consumer patient harm
encrypted QR code security
drugs
drug safety
Distributed databases
Cryptography
counterfeit-drug
counterfeit medicine supply chain
counterfeit goods
blockchain
biblio
Data Analytics Layer For high-interaction Honeypots
Submitted by grigby1 on Mon, 03/09/2020 - 1:27pm
hyper-visor based security services
live VMs
Linux based hypervisor
Linux
LibVMI
KVM
Kernel-based Virtual Machine (KVM)
IOCs (Indicators of compromise)
IOCs
invasive software
intrusion detection system
malware
Human Factors
honeypot
honey pots
high-interaction honeypots
data analytics layer
data analysis
computer systems security
cloud computing paradigm
Cloud Computing
virtual honeypots
VMM
VMI (Virtual machine introspection)
virtualization rejuvenation
Virtualization
virtualisation
Virtual machining
virtual machines
virtual machine security
Virtual machine monitors
virtual machine introspection
volatility plug-ins
structure threat information expression
STIX (Structure Threat Information Expression)
STIX
Scalability
Resiliency
pubcrawl
Organizations
Monitoring
malware attack
biblio
A Proposed Virtual Private Cloud-Based Disaster Recovery Strategy
Submitted by grigby1 on Mon, 03/02/2020 - 1:34pm
Organizations
virtual private cloud-based disaster recovery strategy
traditional disaster recovery
System recovery
security
Resiliency
resilience
Recovery Time Objective (RTO)
recovery time objective
Recovery Point Objective (RPO)
recovery point objective
pubcrawl
Planning
back-up procedures
information technology
information security
Google
disasters
Disaster Recovery (DR)
Disaster Cycle
Computational modeling
Cloud-Based Disaster Recovery
Cloud Computing
business continuity issues
business continuity
biblio
Advance Persistant Threat and Cyber Spying - The Big Picture, Its Tools, Attack Vectors and Countermeasures
Submitted by grigby1 on Wed, 02/26/2020 - 4:40pm
Meterpreter
Wireshark
Vectors
Traceroute
tools
threat vectors
testing
skilled cybercriminal
Reconnaissance
pubcrawl
privacy
primary security concerns
Organizations
Metrics
advance persistant threat
Measurement
malware
Kali Linux
HPING3 Metasploit-Framework
Foot-printing
cyber spying
Computer crime
Clearing Tracks
big picture
big organizations
Attack vectors
advanced persistent threat
Advance Persistent Threat
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
…
next ›
last »