Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Business
biblio
A Hierarchical Architecture for Distributed Security Control of Large Scale Systems
Submitted by grigby1 on Tue, 01/16/2018 - 5:25pm
software applications
Metrics
Monitoring
nonfunctional requirements
pubcrawl
Resiliency
Security Control
security controllers
security rules complexity
Malicious Traffic
Software Architecture
software complexity
Software systems
Sparks
telecommunication traffic
traffic load
web applications
computer network security
Big Data
Business
Cloud Computing
Complexity theory
composability
computational complexity
computer architecture
Computer crime
Attack detection
DDoS
DDoS attack detection
distributed security control
functional requirements
hierarchical distributed architecture
Human behavior
Large Scale Systems
biblio
Cross-Disciplinary Survey on \#34;Data Science \#34; Field Development: Historical Analysis from 1600s-2000s
Submitted by grigby1 on Thu, 12/28/2017 - 12:36pm
Databases
Science of Security
Scalability
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
Metrics
Human Factors
Human behavior
Big Data
data science
Data models
computer science
composability
collaboration
Cloud Computing
Business
biblio
Combining convolutional neural network and self-adaptive algorithm to defeat synthetic multi-digit text-based CAPTCHA
Submitted by grigby1 on Wed, 12/20/2017 - 12:03pm
character recognition
human beings
text-based scheme
synthetic multidigit text-based CAPTCHA
self-adaptive algorithm
Segmentation
reverse Turing test
Optical character recognition software
image segmentation
data entry
convolutional neural network
convolution
China
character segmentation
pubcrawl
CAPTCHA segmentations
Business
add-on recognition part
Neural networks
captchas
CAPTCHA
Clustering algorithms
neural nets
text analysis
composability
clustering
Human Factors
Human behavior
biblio
Requirement analysis and descriptive specification for exploratory evaluation of information system security protection capability
Submitted by grigby1 on Tue, 12/12/2017 - 12:31pm
information system security protection capability
uncertainty
specification description
Security Policies Analysis
security of data
security
requirement analysis
pubcrawl
protective equipment
protection policy
policy-based governance
Information systems
information system structure model
Analytical models
Granular Computing theory
granular computing
Formal Specification
exploratory evaluation requirements
exploratory evaluation process
exploratory evaluation description problem
exploratory evaluation
descriptive specification
description specification
Computational modeling
collaboration
Business
biblio
Policy enforcement for big data security
Submitted by grigby1 on Mon, 12/04/2017 - 11:58am
Metrics
security of data
security
Scientific Computing Security
Resiliency
pubcrawl
Privacy Policy
privacy
policy enforcement
Policy
Big Data
large-scale data storage
data privacy
data analysis
Compositionality
Cloud Computing
Business
big data security
big data privacy
Big Data handling
biblio
Internet of Things (IoT): Security challenges, business opportunities reference architecture for E-commerce
Submitted by grigby1 on Wed, 03/08/2017 - 1:23pm
IoT
WiFi
supply chains
sensors
security of data
security industry
security challenges
security
RFID
reference architecture
pubcrawl170112
physical devices
Bluetooth
Internet of Things (IoT)
Internet of Things
internet
intelligent devices
electronic commerce
e-commerce
Databases
Connected Devices & Wearables
Cloud Computing
business opportunities
Business
biblio
Cyber security operations centre: Security monitoring for protecting business and supporting cyber defense strategy
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
CyberSA
timing
system-on-chip
SoC
security of data
security monitoring
risk management
pubcrawl170109
Monitoring
Log Source
information and communications technology
ICT systems
HMG protective monitoring controls
Her Majestys Government
government data processing
analysis
cyber situational awareness
cyber security operations centre
Cyber Incident Response
cyber defense strategy support
CSOC Strategy
CSOC framework
CSOC Benefits & Challenges
CSOC
Correlation
Computer crime
business protection
business control
Business
biblio
A model for the design of next generation e-supply chain digital forensic readiness tools
Submitted by grigby1 on Tue, 03/07/2017 - 12:36pm
Filtering
trading partners
supply chain management
Software
pubcrawl170109
Next generation networking
network forensics
Monitoring tools
Monitoring
internet
information and communications technology
ICT
Forensics domains
Business
eSC environment
electronic supply chain
electronic commerce
e-Supply Chains (eSCs)
e-supply chain
Digital Forensics
digital forensic readiness tools
Digital forensic readiness (DFR)
Digital forensic Investigation (DFI)
Digital forensic data analysis tools
Cybercrime
cyber-crime
biblio
Literature review of different contention of E-commerce security and the purview of cyber law factors
Submitted by grigby1 on Tue, 03/07/2017 - 12:32pm
Information systems
security privacy policy
security
pubcrawl170109
privacy
legislation
jurisdiction
IT
internet
information technology
Business
electronic commerce
e-consumer protection
E-Commerce Security
e-commerce law
data privacy
cyberspace security
cyber-crime activity
cyber law factor
Computer crime
biblio
An autonomic approach to extend the business value of a legacy order fulfillment system
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
software applications
Manuals
Monitoring
order fulfillment workflow
pubcrawl170107
retailing industry
self-adaptive systems
self-managing systems
service-oriented architecture
legacy software systems
software engineering
software evolution
software maintenance
Software systems
systems interoperability
systems of systems
third party security screening provider
enterprise resource planning
autonomic behavior
Autonomic computing
autonomic control loop design
autonomic software component
Business
business value
Complexity theory
Databases
autonomic approach
ERP systems
error-prone manual process
human error
human monitoring
hybrid systems
legacy multichannel commerce enterprise resource planning system
legacy order fulfillment system
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »