Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data sources
biblio
Web server security evaluation method based on multi-source data
Submitted by aekwall on Mon, 11/23/2020 - 11:23am
Compositionality
Intelligent Data and Security
Intelligent Data Security
web server security evaluation method
web security evaluation model
web security evaluation
web security assessments
single data source
multisource data
multi-source data
host security threat assessment values
evaluation indicators
data sources
XML
Safety
analytic hierarchy process
information processing
web services
internet
pubcrawl
Resiliency
Data models
security
Servers
Scalability
IP networks
security of data
biblio
Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
network threats
user privacy in the cloud
privacy-preserving Sharing
privacy-preserving means
privacy preserving
privacy exposure
cyber threat management
Cyber Threat Information
CTI data
Confidential Information Sharing and Analysis for Cyber Protection
Collaborative sharing
collaborative analysis
C3ISP Framework
attack prediction
API Gateway
data sharing
security of data
information management
data sources
Portals
internetworking
application program interfaces
Scalability
Logic gates
collaboration
cyber-attacks
Metrics
pubcrawl
Resiliency
security
data privacy
Cloud Computing
biblio
Performance Evaluation of the Policy Enforcement Fog Module for Protecting Privacy of IoT Data
Submitted by aekwall on Mon, 11/11/2019 - 11:47am
policy enforcement
active data bundles
cloud
data privacy-penalties
data sources
fog
fog computing infrastructure
local IoT applications
PEFM
active bundles
policy enforcement fog module
privacy controls
Privacy Threats
privacy violations
real-time IoT applications
self-protecting mechanism
sensitive IoT data protection
smart home proof-of-concept scenario
Human behavior
security of data
Cloud Computing
Scalability
data owners
data privacy
Internet of Things
performance evaluation
real-time systems
IoT
pubcrawl
privacy
edge computing
Smart Home
Privacy Policies
Privacy Policy
privacy protection
biblio
Cloud Insider Attack Detection Using Machine Learning
Submitted by grigby1 on Mon, 06/10/2019 - 1:56pm
security
machine learning
machine learning approaches
malicious node
misbehaving node
Monitoring
privacy
pubcrawl
resilience
Resiliency
Long short-term memory
security approaches
security of data
short-term behavioral data
trusted users
User behavior
valuable information
vulnerable information
vulnerable user node
compromised node
anomaly node
attackers
broken node
Cloud Computing
cloud insider attack detection
cloud network
cloud security issues
cloud user
composability
Anomaly Detection
Data models
data sources
deep learning
improvised long short-term memory model
internal attacker
internal attackers compromise
learning (artificial intelligence)
Logic gates
biblio
Automated computer network defence using ARMOUR: Mission-oriented decision support and vulnerability mitigation
Submitted by grigby1 on Tue, 01/23/2018 - 4:01pm
Proactive Cyber Defence
infrastructure data analysis
Mission Assurance
mission-context information
near real-time defensive cyber operations
network operators
network responses
network topology
network-based CoA
network-based courses-of-action
Defence Research and Development Canada
pubcrawl
Resiliency
Responsive Cyber Defence
security
situational awareness
Software
Software Vulnerability Mitigation
vulnerability mitigation
Cyber Attacks
Automated computer network defence
Automated Cyber Defence
automated mission-oriented decision support
Automated Response Actions
composability
Computational modeling
computer architecture
computer network security
computer networks
ARMOUR
cyber defence integration framework
cyber defence science-and-technology platform
data analysis
Data models
data sources
Decision Making
decision support
Decision support systems
biblio
RicherPicture: Semi-automated cyber defence using context-aware data analytics
Submitted by grigby1 on Tue, 01/23/2018 - 4:01pm
Resiliency
Electronic mail
incident response strategy
information
learning (artificial intelligence)
nonnetwork data
operational aspects
organisation
organisational data
pubcrawl
decision-making process
RicherPicture
security
security of data
Security Operation Centre environment
synthetic scenarios
technological developments
threat intelligence data
tools
visual analytics
correlating network data
attack-trend data
automated network defences
automated network-defence actions
Automated Response Actions
Business
composability
Computer crime
computer science
context-aware data analytics
attack-surface
cyber attacks detection
cyber attacks prevention
Cyber defence
cyber-threat landscape
data analysis
data sources
data visualisation
Decision Making
biblio
Adding Support for Theory in Open Science Big Data
Submitted by grigby1 on Tue, 12/12/2017 - 1:27pm
Predictive Analytics
Frameworks
functional data analysis
Human behavior
Human Factors
Mathematical model
Metrics
natural sciences computing
open science big data
Economic indicators
Principal differential analysis
Provenance
pubcrawl
Resiliency
storage management
theory
theory formation
Analytical models
data transfer
data storage
data sources
data provenance
data privacy
Data models
data fitting
data curation
data analysis
Compositionality
composability
citable reusable data
Biological system modeling
Big Data Analytics
Big Data
biblio
An overview of cloud middleware services for interconnection of healthcare platforms
Submitted by BrandonB on Wed, 05/06/2015 - 2:12pm
middleware
Healthcare
healthcare platform interconnection
heterogeneous devices
IaaS
management problem
medical computing
medical devices
Medical services
health care
PaaS
performance improvement
security
security of data
security problem
Software Architecture
software performance evaluation
standards
cloud technologies
application program interfaces
Big Data
big-data analytics
Biomedical imaging
cloud
Cloud architecture
Cloud Computing
cloud computing middleware services
API
computer architecture
Context
data analysis
Data integration
data sources
delay problem
electronic health records
electronic healthcare register literature
biblio
Soft systems methodology in net-centric cyber defence system development
Submitted by BrandonB on Tue, 05/05/2015 - 12:09pm
modeling
system dynamics model
System Dynamics
system behaviour
SSM
soft systems methodology
sociotechnical systems
situational awareness
security of data
SA
net-centric information system
net-centric hypothesis
net-centric cyber defence system development
net-centric approach
Net-Centric
collaboration
interdependent dynamic relationships
information value
Information systems
information sharing community
information security
information reach
information environment
human activity system
Distributed Information Systems
data sources
complexity
Communities
command and control
collaborative communities
biblio
Security with privacy - A research agenda
Submitted by BrandonB on Tue, 05/05/2015 - 9:35am
PE applications
social media
security of data
security
Research Agenda
privacy-preserving data management
privacy-preserving data analysis
privacy-enhancing techniques
privacy
PII
personally identifiable information
PE techniques
Big Data
outsourced data
Media
encryption
Electronic mail
data sources
data privacy
cloud environment
Cloud Computing
Cancer
business intelligence
big data analysis
1
2
next ›
last »