Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Organizations
biblio
Risk Management System for Operational Services in Data Center : DC Papa Oscar Cikeas Case study
Submitted by grigby1 on Fri, 11/18/2022 - 2:08pm
information technology
Security Risk Management
Information Technology Risk Management
Information Technology Infrastructure Library (ITIL) Service Operation
Information Technology Infrastructure Library (ITIL)
data centers
navigation
Libraries
computer science
risk management
Scalability
Resiliency
resilience
Metrics
Human Factors
Human behavior
pubcrawl
Organizations
biblio
A Security Risk Management Framework for Permissioned Blockchain Applications
Submitted by grigby1 on Fri, 11/18/2022 - 2:07pm
Resiliency
Security Risk Management
permisioned blockchain
blockchain security
blockchain risk evaluation
blockchains
Stakeholders
Scalability
Conferences
Internet of Things
resilience
Metrics
Human Factors
Human behavior
pubcrawl
security
Organizations
risk management
biblio
Risk Management of Silent Cyber Risks in Consideration of Emerging Risks
Submitted by grigby1 on Fri, 11/18/2022 - 2:06pm
Cyberspace
Security Risk Management
Silent cyber risk
Risk Matrix
Risk Breakdown Structure
Electric breakdown
Combination risk
Alteration risk
Insurance
Focusing
risk management
Scalability
Resiliency
resilience
Metrics
Human Factors
Human behavior
pubcrawl
security
Organizations
biblio
Coverless Steganography Method based on the Source XML File Organization of OOXML Documents
Submitted by grigby1 on Thu, 10/20/2022 - 4:01pm
Organizations
pubcrawl
Metrics
Heuristic algorithms
privacy
composability
real-time systems
Receivers
Resistance
organization
Steganography
XML
compound tree
OOXML documents
search-based coverless steganography algorithms
steganography detection
biblio
“X-Phish: Days of Future Past”‡: Adaptive & Privacy Preserving Phishing Detection
Submitted by grigby1 on Wed, 10/12/2022 - 2:36pm
Adaptation models
adaptive
collaborative learning
feature extraction
Human behavior
machine learning
network security
Organizations
Phishing
Phishing Detection
privacy
privacy preserving
pubcrawl
biblio
Multiple Security Threats with Its Solution in Internet of Things (IoT)
Submitted by aekwall on Fri, 09/30/2022 - 2:46pm
composability
the System model of IoT
smart technologies
security attacks
Power engineering
IoT security
Firewalls (computing)
attacks
Industries
security
Human behavior
Resiliency
Metrics
pubcrawl
real-time systems
performance evaluation
IoT
Organizations
biblio
Operational framework for Enhancing Trust in Identity Management as-a-Service (IdMaaS)
Submitted by aekwall on Fri, 09/30/2022 - 2:39pm
security
Organizations
Computational modeling
trust
Cloud Computing
Scalability
pubcrawl
Resiliency
Human behavior
Reliability engineering
Costs
Identity management
Entrepreneurship
identity-management-as-a-service IdMaaS
operational Framework
biblio
Decentralized Identifiers and Self-Sovereign Identity - A New Identity Management for 6G Integration? : MobileCloud 2021 Invited Talk
Submitted by aekwall on Fri, 09/30/2022 - 2:39pm
6G mobile communication
Conferences
Data protection
Human behavior
Identity management
Law
Organizations
pubcrawl
Public key
Resiliency
Scalability
Shape
biblio
Dynamic Management of Identity Federations using Blockchain
Submitted by aekwall on Fri, 09/30/2022 - 2:39pm
Organizations
blockchain
Protocols
Scalability
distributed ledger
pubcrawl
Resiliency
Human behavior
metadata
Identity management
Dynamic Identity Federation
Fabric
federated identity management
Identity federation
Markup languages
biblio
Cybersecurity risks : A behavioural approach through the influence of media and information literacy
Submitted by grigby1 on Thu, 09/29/2022 - 4:39pm
Systematics
statistical analysis
Sociology
Risk
pubcrawl
Organizations
Media
information literacy
Human behavior
HEI
Games
Cybersecurity
computer security
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »