Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
business data processing
biblio
Modeling of Insider Threat using Enterprise Automaton
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
automata
psycho-social behaviors
novel unified model
nonhuman agents
insider threat modeling
insider attacker
insider agents
insider
Enterprise process
enterprise automaton
authorized privileges
security management
Silicon
Task Analysis
Metrics
authorisation
Attack detection
Computational modeling
privacy issues
data privacy
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
business data processing
security
Organizations
insider threat
biblio
Agent Based Cybersecurity Model for Business Entity Risk Assessment
Submitted by grigby1 on Tue, 03/30/2021 - 12:04pm
Predator prey systems
Mathematical model
multi-agent systems
network agents
network setting
network threats
network traffic features
network transactions
neural nets
neural network
Neural networks
Organizations
internal attacks
pubcrawl
risk assessment
risk management
risk-based approach
security
security solutions
self-organizing behavior
telecommunication traffic
third-party users
time-state chart
Workstations
Cybersecurity
agent-based modelling
agent-based system modelling
attack-state
Business
business data processing
business entity risk assessment
complex enterprise systems
computer network security
computer networks
critical infrastructure
cyber-attacks
agent based cybersecurity
data access
defense mechanism
defense strategies
dynamic state changes
external attacks
Human behavior
Human Factors
human interactions
information exchange
innovative information technology
biblio
An Effective Semantic Security Metric for Industrial Cyber-Physical Systems
Submitted by grigby1 on Mon, 03/29/2021 - 11:56am
pubcrawl
systems analysis
System-of-Systems
system design
SoS context
Semantics
Semantic Networks
security of data
Security Metrics
security metric definitions
Security Engineering
security by design
security
Runtime
Resiliency
resilience
Measurement
Model-Based Engineering
Metrics
industrial cyber-physical systems
ICPS
embedded systems
embedded system engineering
effective semantic security metric
cyber-physical systems
Current measurement
composability
business processes
business data processing
Business
metrics testing
biblio
Enforcing Corporate Governance's Internal Controls and Audit in the Cloud
Submitted by aekwall on Mon, 03/22/2021 - 1:06pm
Compositionality
Self-protection
organizational aspects
internal controls and audit process
Internal Controls and Audit functions
integrity guarantee
ICA functions
corporate governance
cloud-based services
business organizations
privacy guarantee
auditing
encryption audits
Selective Encryption
outsourcing
security of data
Predictive Metrics
business data processing
data privacy
process control
cloud-based solutions
Data protection
pubcrawl
Resiliency
security
Organizations
encryption
data access
Cryptography
Cloud Computing
biblio
The privacy paradigm : An overview of privacy in Business Analytics and Big Data
Submitted by grigby1 on Mon, 12/28/2020 - 12:37pm
Big Data
Technology management
privacy paradigm
GPDR
data mining technologies
dados
business analytics
analytics
big data privacy
Google
Data protection
Companies
privacy
information technology
data privacy
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
business data processing
Data mining
data analysis
biblio
Design of Trusted B2B Market Platforms using Permissioned Blockchains and Game Theory
Submitted by grigby1 on Wed, 12/02/2020 - 2:15pm
secure B2B collaboration
Human behavior
Human Factors
insert
online business-to-business collaboration platforms
permissioned blockchain
privacy
privacy preservation
private B2B collaboration
pubcrawl
Games
smart contracts
Strategic Agents
style
styling
trust
trusted B2B market platforms
trusted collaboration
Trusted Computing
cryptographic regulation protocols
blockchain
business data processing
business sensitive information
collaboration
competitive agents
component
Computing Theory
contracts
Cryptographic Protocols
adequate transparency
data privacy
deep business logic
electronic commerce
enterprise buyers
enterprise sellers
formatting
game theoretic modeling
game theory
biblio
Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services
Submitted by grigby1 on Fri, 11/20/2020 - 2:14pm
Policy
managed security service
managed security service provider
Managed security services
Monitoring
MSS platform customers
MSSP
multi-tenant
organization
outsourcing
Peer-to-peer computing
platform solution
large-scale enterprises
policy-based governance
Portals
privacy
privacy concerns
private sectors
pubcrawl
public sectors
security of data
Security Policies Analysis
Task Analysis
use case
data anonymization
business data processing
cloud service
collaboration
collaborative data sharing
component
computer security
confidential data sharing
cyber security
cyber security data sharing
cyber security information
cybercrimes
architecture
data encryption
data privacy
Data Sanitization
data sharing
design
diagram
flexible data sharing
information
Lakes
large-scale enterprise
biblio
Finding Concurrency Exploits on Smart Contracts
Submitted by grigby1 on Tue, 10/06/2020 - 2:00pm
Cryptography
smart contracts
smart contract
security of data
security attacks
security
Resiliency
resilience
pubcrawl
Metrics
general miner-side type
ethereum
cyber physical systems
application domains
CPS
contracts
Concurrent computing
concurrency exploits
concurrency exploit
Concurrency
composability
business services
business data processing
blockchain
Bars
biblio
Cloud, Big Data IoT: Risk Management
Submitted by grigby1 on Fri, 08/28/2020 - 3:33pm
Metrics
big data security in the cloud
digital devices communications
competitive business environment
business quality improvement
business risks
interconnected devices
Distributed databases
Scalability
resilience
Internet of Things
Big Data
Resiliency
pubcrawl
IoT
business data processing
security
risk management
Cloud Computing
biblio
Hybrid Model for Web Application Vulnerability Assessment Using Decision Tree and Bayesian Belief Network
Submitted by aekwall on Mon, 08/24/2020 - 1:37pm
feature extraction
Web application vulnerability assessment
vulnerability assessment
security of data
Resiliency
pubcrawl
machine learning algorithms
machine learning
logical Web pages
learning (artificial intelligence)
internet
hybrid model
Bayes methods
Entropy
Decision trees
Decision Tree
consumer relationship
composability
Classification algorithms
business process
business data processing
belief networks
Bayesian Belief Network (BBN)
Bayesian belief network
1
2
3
4
5
next ›
last »