Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
business data processing
biblio
Complex Networks Monitoring and Security and Fraud Detection for Enterprises
Submitted by aekwall on Mon, 02/10/2020 - 12:07pm
business data processing
complex networks
complex networks monitoring
Compositionality
CoNeSec track
Data mining
data privacy
enterprises
fraud
fraud detection
Human Factors
network log data
pubcrawl
Resiliency
security
Smart Grid Sensors
biblio
The Location-Centric Approach to Employee's Interaction Pattern Detection
Submitted by grigby1 on Tue, 01/21/2020 - 11:24am
Insider Threat Detection
Access Control
access control system
authorisation
business data processing
business processes
collaboration
data analysis
Data mining
data visualisation
Data visualization
employee interaction pattern detection
Human behavior
information security
insider threat
visualization-driven technique
location-centric approach
location-centric bevavior patterns
Metrics
Organizations
Personnel
policy-based governance
pubcrawl
resilience
Resiliency
security policies
sensors
step charts
Task Analysis
biblio
Expert System for Managing Policy of Technological Security in Uncertainty Conditions: Architectural, Algorithmic, and Computing Aspects
Submitted by grigby1 on Thu, 01/02/2020 - 2:46pm
security
probability measure
process control
Production
pubcrawl
resilience
Resiliency
Safety
Scalability
Scientific Computing Security
probability
security of data
technological process
technological safety
technological safety management
technological security
theory of evidence
uncertainty
uncertainty conditions
uncertainty handling
expert system
algorithmic aspects
architectural aspects
business data processing
Circuit faults
Compositionality
computing aspects
Dempster-Schafer trust function
diagnostic variables
enterprise
False Data Detection
expert systems
Expert Systems and Security
faulty process chains
faulty technological chain
Human behavior
inference mechanisms
knowledge base production
Predictive Metrics
biblio
A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
Microservices Security
Application Container Security
automatic code generation techniques
business capabilities
cyber risk
diversification index
economics-of-scale incentives
microservice architectures structure
microservices attack surfaces
program compilers
moving target defense mechanism
MSA
multistep attacks
security risk assessment
security risk-oriented software diversification
Transforms
compiler security
security of data
Compositionality
moving target defense
Security Metrics
business data processing
risk analysis
Logic gates
Indexes
Software Architecture
Measurement
Metrics
pubcrawl
Resiliency
Software
security
Scalability
biblio
Container Cluster Model Development for Legacy Applications Integration in Scientific Software System
Submitted by aekwall on Mon, 10/28/2019 - 10:38am
MD - SLAG – MELT
computing applications
container
container cluster model development
containerization systems
distributed computer simulation
high-efficiency computing
high-performance computing
intellectual processing
legacy applications integration
mathematical analysis
computer software
MD-SLAG-MELT system
modern scientific information systems
molecular dynamic Modeling
nonstandardized interfaces
programming languages
scientific software system
system MD-SLAG-MELT
ubiquitous computing
Scientific Computing Security
Load modeling
Big Data
computer architecture
Resiliency
pubcrawl
Computational modeling
database
Databases
Software systems
software maintenance
Containers
Servers
pattern clustering
business data processing
visualization
Predictive Metrics
scientific information systems
Compositionality
cluster
computer experiments results
computer simulation systems
biblio
Security Metrics: Principles and Security Assessment Methods
Submitted by aekwall on Mon, 07/01/2019 - 10:11am
security assessment
Taxonomy of Security Metric
taxonomy
Standards organizations
security standards
security sections
security of data
Security Metrics
security metric
security measures
security conditions
security assessments
security assessment methods
Measurement
pubcrawl
Organizations
organizational security
Metrics
metric standards
Meta-Metric
information technology
information security
business data processing
benchmarking method
Benchmark testing
metrics testing
biblio
Automated Threat Report Classification over Multi-Source Data
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
multisource data
Training
threat report documents
Threat report
Standards organizations
security of data
security
Scalability
Resiliency
pubcrawl
pattern classification
Organizations
NLP
natural language processing techniques
natural language processing
advanced persistent threats
Metrics
machine learning model
learning (artificial intelligence)
Human behavior
feature extraction
enterprise system defenders
document handling
defense systems
Data mining
command and control systems
collaboration
business data processing
bias correction
automated threat report classification
biblio
Prevention of Ransomware Execution in Enterprise Environment on Windows OS: Assessment of Application Whitelisting Solutions
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
unauthorized applications
Organizations
pubcrawl
Ransomware
ransomware execution prevention
Resiliency
SecureAPlus
Signature based
Trusted Computing
Microsoft Windows (operating systems)
virtual environment
VoodooShield
whitelisting
Windows edition
Windows Operating System Security
Windows OS
Windows Server edition
zero-day antimalware solution
composability
application control solutions
application whitelisting software
Application Whitelisting Solutions
AppLocker
authorisation
blacklisting
business data processing
CodeShield
administrative privileges
Cryptography
data breach prevention
Databases
enterprise environment
invasive software
malicious files
malware
Metrics
biblio
Estimating Target Distribution in security assessment models
Submitted by grigby1 on Wed, 09/12/2018 - 11:13am
pubcrawl
Vulnerability
target distribution
Standards organizations
security of data
security monitoring system
security assessment
security
Resiliency
resilience
real-time systems
real-time system configuration
business data processing
Organizations
network security assessment models
Monitoring
information security
distributed processing
distributed computing
Databases
Damage Assessment
cyber-attacks
Computers
Computational modeling
biblio
Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Languages
Submitted by grigby1 on Mon, 06/11/2018 - 3:46pm
collaboration
middleware security
security extension
modelling language
middleware
cyber security requirements
cyber security concepts
Business Process Model and Notation
business process
business data processing
BPMN processes
BPMN
specification languages
policy-based governance
resilience
Policy
Resiliency
Complexity theory
Formal Specification
visualization
Semantics
tools
computer security
security framework
security of data
composability
pubcrawl
« first
‹ previous
1
2
3
4
5
next ›
last »