Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Access controls
biblio
WhatsApp: Cyber Security Risk Management, Governance and Control
Submitted by aekwall on Fri, 01/13/2023 - 3:58pm
pubcrawl
whatsapp
Vulnerability
threat
social networking (online)
Security Risk Management
security
Scalability
risks
risk management
Resiliency
Access controls
Mobile Applications
Metrics
Internet telephony
Human Factors
Governance
Freeware
data science
controls
assets
biblio
Zero Trust Federation: Sharing Context under User Control towards Zero Trust in Identity Federation
Submitted by grigby1 on Tue, 12/21/2021 - 3:19pm
Protocols
zero trust
User Managed Access
Standards organizations
Semantics
Scalability
Resiliency
resilience
pubcrawl
Prototypes
Acoustic Fingerprints
policy-based governance
Organizations
Identity federation
Human Factors
Human behavior
Conferences
collaboration
authorization
Access controls
biblio
A Deep Learning Based Intrusion Detection System on GPUs
Submitted by grigby1 on Tue, 12/01/2020 - 1:47pm
information security market
security breaches
Resiliency
resilience
real-world operations
pubcrawl
password protections mechanisms
parallel computing
optimization functions
neural network approach
neural nets
modern learning mechanism
market computers
learning (artificial intelligence)
intrusion detection system
Intrusion Detection
Access controls
IDS system
IDS on GPU
IDS
graphics processing units
GPUs
firewalls
encryption mechanisms
dynamic intrusion detection mechanism
deep learning based intrusion detection system
deep learning algorithms
deep learning
cyber world
composability
Big Data
authorisation
biblio
Context-Based Security and Privacy for Healthcare IoT
Submitted by grigby1 on Wed, 11/14/2018 - 1:18pm
patient-centric information
Human Factors
information collection
information sharing
Internet of Things
large scale connectivity
medical devices
medical information systems
Medical services
nursing staff
HIoT
physicians
privacy
pubcrawl
Real-time monitoring
regulatory compliance
Scalability
security
sensors
timely treatment
data privacy
Access controls
actuators
authorisation
Big Data
clinical staff
Context
context-based privacy
context-based security
context-sensitive role-based access control scheme
Access Control
expert systems
health care
health status
healthcare industry
healthcare innovation
healthcare Internet of things
healthcare IoT
healthcare knowledge
file
Circumvention of Security: Good Users Do Bad Things
Submitted by awhitesell on Fri, 12/16/2016 - 3:51pm
Science of Security
Access controls
authentication
computer security
Human Factors
NSA SoS Lablets Materials
Science of Human Circumvention of Security
Science of Security
UIUC
UIUC
NSA SoS Lablets Materials
Science of Human Circumvention of Security
biblio
Circumvention of Security: Good Users Do Bad Things
Submitted by awhitesell on Fri, 12/16/2016 - 3:51pm
Science of Security
Access controls
authentication
computer security
Human Factors
NSA SoS Lablets Materials
Science of Human Circumvention of Security
Science of Security
UIUC
UIUC
NSA SoS Lablets Materials
Science of Human Circumvention of Security
biblio
ISO/IEC/IEEE International Standard for Information technology – Telecommunications and information exchange between systems – Local and metropolitan area networks – Part 1AR: Secure device identity
Submitted by BrandonB on Fri, 05/01/2015 - 8:57am
Local area networks
X.509
security
secure device identifier
secure association
port-based network access control
PKI
network security
Metropolitan area networks
MANs
MAC security
Access Control
LANs
ISO standards
information technology
IEEE standards
IEC standards
certificate
authorization
authentication
Access controls