Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Law
biblio
Comparative analysis of Governmental Countermeasures to cyber attacks
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
ISAO
US government
United States
strengthening national cyber security posture initiative
South Korea
Sony
security of data
sanctions EO
retaliatory action
pubcrawl170109
presidential secretary
North Korea
ministry of industry
Law
KHNP
Comparative Analysis
Interviews
internet
information sharing EO
Inductors
governmental countermeasures
Government
cyber-attacks
cyber security response capability
Cyber incident
Cyber Attacks
CTIIC
control tower
Computer hacking
Computer crime
biblio
Privacy Principles for Sharing Cyber Security Data
Submitted by grigby1 on Thu, 02/23/2017 - 2:26pm
pubcrawl170106
organizational risk
Organizations
personal information exposure
poker queries
privacy
privacy balancing
privacy preservation
privacy principles
privacy risks
organizational boundaries
qualitative evaluation
queries
query processing
risk management
security information
security of data
trust requirements
Trusted Computing
engineering approaches
computer security
cyber security
cyber security data sharing
data confinement
data exposure
data privacy
data sharing
Distributed databases
distributed security system
business data processing
forward progress
internal information
Law
least disclosure
minimal requisite fidelity
moderated queries
network traffic
organisational aspects
biblio
Classifying Sanctions and Designing a Conceptual Sanctioning Process for Socio-Technical Systems
Submitted by mpsingh on Tue, 03/29/2016 - 7:57am
Apr'16
Compliance
Law
NCSU
Norms
Policy-Governed Secure Collaboration
sanctions
Sociology
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Policy-Governed Secure Collaboration
NCSU
Understanding the Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Apr'16
biblio
#x201C;Role of metadata in forensic analysis of database attacks #x201C;
Submitted by BrandonB on Wed, 05/06/2015 - 1:55pm
fraudulent transaction
trail obfuscation
table storage
SQL injection
security issue
reconnaissance attack
privacy issue
open source database forensics tool
online activities
metadata
meta data
linked hash technique
Law
information retrieval
Information analysis
Handheld computers
anti-forensics attacks
forensic analysis
e-transactions
digital notarization
Digital Forensics
digital evidence
database server artifacts
database security breaches
database forensics
database attacks
data privacy
court of law
Conferences
cache
audit logs
antiforensics attacks
biblio
Explaining the Role of Trust in Cloud Service Acquisition
Submitted by BrandonB on Wed, 05/06/2015 - 1:26pm
cloud transactions
Law
mediating
Organizations
personal identity information
privacy
sensitive personal information
service provider ability
service provider integrity
transacting parties
trust
Banking
Cloud Computing
cloud services acquisition
internet
Context
Data protection
digital identity management system
financial institutions
trusted cloud identity ecosystem
Trusted Computing
user assurances
user confidence
Ghana
identity abuses
information privacy
interest protection
biblio
Explaining the Role of Trust in Cloud Service Acquisition
Submitted by BrandonB on Wed, 05/06/2015 - 1:26pm
cloud transactions
identity abuses
information privacy
interest protection
internet
Law
mediating
Organizations
personal identity information
privacy
sensitive personal information
Banking
Cloud Computing
cloud services acquisition
Ghana
Context
service provider ability
service provider integrity
transacting parties
trust
trusted cloud identity ecosystem
Trusted Computing
user assurances
user confidence
Data protection
digital identity management system
financial institutions
biblio
Ethics behind Cyber Warfare: A study of Arab citizens awareness
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
ethics
technological research centers
security systems
scientific research centers
personal information
offence
military war
military computing
Law
information technology
government data processing
Government
Arab citizens awareness
ethical aspects
despotic government plans
defense
cyber warfare
cyber war
cyber security
cyber attack
cyber army
Computers
Computer hacking
Computer crime
biblio
An Improved Cross-Layer Privacy-Preserving Authentication in WAVE-Enabled VANETs
Submitted by BrandonB on Tue, 05/05/2015 - 10:31am
Privacy-preserving
WAVE-enabled VANET
WAVE-based vehicular ad hoc networks
vehicular ad hoc networks
vehicles
VANETs
valid signature
telecommunication security
security strength evaluation
Security analysis
receiving entity
public key cryptography
Public key
private key reveal attack
private key cryptography
authentication
malicious receiving vehicle
legal signing vehicle
Law
improved cross-layer privacy-preserving authentication scheme
identity trace
identity revocation
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature algorithm
ECDSA
digital signatures
data privacy
authentication scheme
biblio
An ID-Based User Authentication Scheme for Cloud Computing
Submitted by BrandonB on Tue, 05/05/2015 - 8:37am
anonymity
authentication
authorisation
authorization
Cloud Computing
cloud computing environments
Cryptography
ID-based scheme
ID-based user authentication scheme
Law
mobile devices
Nickel
Servers
user authentication
biblio
The rules of engagement for cyber-warfare and the Tallinn Manual: A case study
Submitted by BrandonB on Mon, 05/04/2015 - 2:40pm
Force
Tallinn Manual
standards
security of data
Protocols
Organizations
Manuals
Law
international law
Computer crime
cyber-warfare
Cyber-Terrorism
cyber-sabaotge
cyber-espionage
cyber-attacks
Cooperative Cyber Defence Centre of Excellence
Computers
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »