Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
military computing
biblio
Analysis of Identity and Access Management alternatives for a multinational information-sharing environment
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
Linear programming
US Department of Defense
technological solutions
technical factor
systems engineering
Scalability
Resiliency
Reliability
pubcrawl
political factors
operational factor
National security
multinational information sharing environment
military computing
military communication
access management alternative
Joint Information Environment
Identity management
identity and access management technologies
Identity and Access Management
identity analysis alternative
Human behavior
Governance protocols
Economics
economic factor
Cybersecurity
computer security
authorization
authorisation
Australia
biblio
Cyber Terrain Mission Mapping: Tools and Methodologies
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
military computing
tools
situational awareness
sensors
security of data
Resiliency
pubcrawl
Organizations
mission-centric cybersecurity
mission relevant cyber terrain
mission execution
Mission Assurance
composability
Metrics
key terrain cyber
Cyberspace
cyber terrain mission mapping
cyber situational awareness
cyber mission mapping
cyber dependency impact analysis
Cyber Dependencies
cyber assets
computer security
Computational modeling
biblio
Semantic Information Fusion to Enhance Situational Awareness in Surveillance Scenarios
Submitted by grigby1 on Tue, 02/06/2018 - 2:04pm
inference mechanisms
Network reconnaissance
National security
military computing
military applications
Markov processes
Markov logic network
logical reasoning
knowledge model
ISR-AA
intelligence-surveillance-and-reconnaissance analytics architecture
information integration
Object oriented modeling
high-level data fusion component
enhanced situational awareness
Databases
Data mining
Data integration
critical events detection
cognition
civil protection
autonomous aerial vehicles
aerospace computing
Resiliency
Unmanned Aircraft Systems
UAS
surveillance scenarios
surveillance
situational picture
situational awareness
sensor fusion
sensor data
semantic information fusion
security forces
video surveillance
reasoning component
pubcrawl
probabilistic reasoning
Probabilistic logic
probabilistic information processing
OOWM
Ontology
ontologies (artificial intelligence)
object-oriented world model
object-oriented methods
biblio
SDN testbed for validation of cross-layer data-centric security policies
Submitted by grigby1 on Wed, 01/10/2018 - 12:24pm
operational military systems
Software-Defined Networks
software-defined networking
software defined networking
Software
Servers
security policies
security
SDN security mechanisms
Resiliency
pubcrawl
principal component analysis
Ports (Computers)
Access Control
OpenFlow-based testbed
military computing
information security
Data Security
cross-layer data-centric security policies
Cross Layer Security
control systems
Containers
computer network security
computer centres
composability
Communication system security
biblio
System security engineering vulnerability assessments for mission-critical systems and functions
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
supply chains
vulnerability identification
vulnerability assessment
US Department of Defense
testing
Systems engineering and theory
systems engineering
system security engineering vulnerability assessments
system security engineering
system security
system maturity points
Databases
Software
security of data
security
pubcrawl170112
mission-critical systems
mission-critical functions
military computing
DoD
Department of Defense
defense systems
biblio
Integrity of a common operating picture in military situational awareness
Submitted by BrandonB on Tue, 05/05/2015 - 12:41pm
Microwave integrated circuits
Wireless communication
Weight measurement
situational awareness information
situational awareness
military situational awareness
military operations
military computing
military command and control
C2
integrity
Decision Making
COP integrity
common operating picture integrity
Common Operating Picture
command and control systems
command and control
Cameras
biblio
Operational data classes for establishing situational awareness in cyberspace
Submitted by BrandonB on Tue, 05/05/2015 - 12:30pm
networking technologies
US Department of Defense
United States
tactical decision-making
strategic decision-making
security of data
real-time systems
operational needs
operational decision-making
operational data classes
operational cyber environment
Cyber Attacks
military computing
Intrusion Detection
Information systems
Educational institutions
Department of Defense
defence industry
Decision Making
cyberspace operations
Cyberspace
cyber situational awareness
biblio
Secure Reliable Group Communication for Tactical Networks
Submitted by BrandonB on Tue, 05/05/2015 - 12:09pm
norm
tactical networks
tactical communication
suite-b
secure group communication
SECRET
reliable group communication
Reliability
Protocols
NSA Suite B cryptography
authentication
multicast
military computing
military communication
group oriented communication
encryption
Cryptography
computer network security
computer network reliability
computer architecture
biblio
Ethics behind Cyber Warfare: A study of Arab citizens awareness
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
ethics
technological research centers
security systems
scientific research centers
personal information
offence
military war
military computing
Law
information technology
government data processing
Government
Arab citizens awareness
ethical aspects
despotic government plans
defense
cyber warfare
cyber war
cyber security
cyber attack
cyber army
Computers
Computer hacking
Computer crime
biblio
Defensive maneuver cyber platform modeling with Stochastic Petri Nets
Submitted by BrandonB on Tue, 05/05/2015 - 11:19am
control systems
Cyberspace
deceptive defense strategies
defensive maneuver cyber platform modeling
information systems security
malicious attackers
military computing
moving target defense strategies
Petri nets
security
security of data
standards
stochastic petri nets
Stochastic processes
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »