Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Business
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
An Effective Semantic Security Metric for Industrial Cyber-Physical Systems
Submitted by grigby1 on Mon, 03/29/2021 - 11:56am
pubcrawl
systems analysis
System-of-Systems
system design
SoS context
Semantics
Semantic Networks
security of data
Security Metrics
security metric definitions
Security Engineering
security by design
security
Runtime
Resiliency
resilience
Measurement
Model-Based Engineering
Metrics
industrial cyber-physical systems
ICPS
embedded systems
embedded system engineering
effective semantic security metric
cyber-physical systems
Current measurement
composability
business processes
business data processing
Business
metrics testing
biblio
Research on Sensitivity Audit Scheme of Encrypted Data in Power Business
Submitted by aekwall on Mon, 03/22/2021 - 1:05pm
Predictive Metrics
informatization construction
known plaintext attacks
plaintext attacks
power business data sensitivity
power engineering computing
Power industry
power production
power system economics
power system security
Frequency measurement
pubcrawl
security demonstration
sensitive data audit
Sensitivity
sensitivity audit scheme
Standard Network Data Security System
standards
transparent encryption
Weight measurement
Data protection
Scalability
Resiliency
Human behavior
Business
ciphertext data
Compositionality
Cryptography
data information
Data models
Security Audits
data resource
Data Security
data security protection
data storage
decryption key
Electricity supply industry
encrypted data
encryption
encryption audits
biblio
A Distributed Interdomain Control System for Information-Centric Content Delivery
Submitted by aekwall on Mon, 11/30/2020 - 12:02pm
Information-Centric Networking (ICN)
CURLING supports efficient Internet-scale content delivery
CURLING system
current Internet
distributed interdomain control system
domain-level Internet subtopologies
dynamic alternative paths
efficient content delivery
facto platform
host-centric
Information-Centric content delivery
cost-efficient Internet-scale content delivery
information-centric networking paradigm
interdomain hop-by-hop content resolution mechanism
IP-based Internet
large-scale content distribution
manageability
network operators
network policies
Software-defined networking (SDN)
tight coupling
Internet-scale Computing Security
control systems
IP networks
Resiliency
Human behavior
pubcrawl
composability
Routing
Metrics
internet
content management
Business
automobiles
Scalability
consumers
data planes
in-network caching
Future Internet
policy governance
content delivery
content delivery paths
content sources
control content access
biblio
An Incentive Mechanism Using Shapley Value for Blockchain-Based Medical Data Sharing
Submitted by aekwall on Mon, 11/23/2020 - 11:28am
data miners
Compositionality
Incentive mechanism
Shapley value
diseases
Medical diagnostic imaging
blockchain-based medical data sharing
computational process
cooperation model
medical information systems
disease diagnosis
incentive schemes
medical data sharing
Shapley value revenue distribution
topological relationships
Intelligent Data Security
Intelligent Data and Security
Resiliency
Scalability
data owners
Big Data
data privacy
security
game theory
Data models
learning (artificial intelligence)
security of data
pubcrawl
blockchain
Business
machine learning techniques
cryptocurrencies
Distributed databases
Predictive models
biblio
Towards provably-secure performance locking
Submitted by aekwall on Mon, 11/09/2020 - 1:32pm
Electronics packaging
provably-secure performance locking
performance locking
integrated circuit thwarts attacks
functional locking
FabScalar microprocessor
FabScalar
boolean satisfiability (sat)
intellectual property piracy
IP piracy
Degradation
security of data
Clocks
multiprocessing systems
Integrated circuit modeling
Business
policy-based governance
composability
pubcrawl
Resiliency
power aware computing
security
biblio
Situation Awareness-Oriented Cybersecurity Education
Submitted by grigby1 on Wed, 11/04/2020 - 1:59pm
Knowledge engineering
teaching modules
teaching
Situation Awareness
Servers
security of data
pubcrawl
professional aspects
privacy
network security course
multiple-step attack
mission-driven analytics
microscopic perspectives
big picture
isolation problem
educational courses
cybersecurity profession
cybersecurity education
cyber physical systems
Curriculum development
cross-layer situation knowledge reference model
computer security
computer science education
computer aided instruction
Business
biblio
Ontology-based Dynamic and Context-aware Security Assessment Automation for Critical Applications
Submitted by aekwall on Mon, 11/02/2020 - 2:46pm
ontology-based security model
Virtualization
virtualisation
ubiquitous computing
tools
testing
standards
security testing
security of data
Security Metrics
security assessment architecture
security aptitude
quantifiable security assessment process
pubcrawl
application configurations
ontology-based dynamic security assessment automation
Ontology
ontologies (artificial intelligence)
Ontologies
Metrics
metrics testing
Measurement
Dynamic Application Security Testing
critical infrastructure
context-aware security assessment automation
Business
automation
application security
biblio
A Demonstration of Privacy-Preserving Aggregate Queries for Optimal Location Selection
Submitted by aekwall on Mon, 10/26/2020 - 11:54am
Protocols
Business
query processing
Metrics
privacy
pubcrawl
Human behavior
Resiliency
mobile computing
service providers
Cryptographic Protocols
security
data privacy
encryption
Servers
vertical businesses
wireless services
Location Privacy in Wireless Networks
collected location data
privacy-preserving aggregate queries
privacy preserving solutions
partially homomorphic cryptosystem
optimal location selection
mobile operators
location-based queries
enormous extent
demonstration
sensitive data
mobile phones
organization
Aggregates
location information
private data
Homomorphic encryption
Compositionality
biblio
Linux Security: A Survey
Submitted by aekwall on Mon, 10/26/2020 - 11:46am
password
Linux Operating System Security
Linux security
firewall security
file permissions
File
antivirus
firewall
Predictive Metrics
microsoft windows
authorisation
Business
Metrics
composability
pubcrawl
Resiliency
Linux
invasive software
security
malware
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »