Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security management
biblio
Research on Audit Model of Dameng Database based on Security Configuration Baseline
Submitted by aekwall on Tue, 04/27/2021 - 1:27pm
intellectual property security
policy-based governance
composability
Dameng database
database audit model
Database systems
Human behavior
password
pubcrawl
Resiliency
Scalability
Security Audits
security configuration baseline
security management
biblio
Modeling of Insider Threat using Enterprise Automaton
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
automata
psycho-social behaviors
novel unified model
nonhuman agents
insider threat modeling
insider attacker
insider agents
insider
Enterprise process
enterprise automaton
authorized privileges
security management
Silicon
Task Analysis
Metrics
authorisation
Attack detection
Computational modeling
privacy issues
data privacy
Resiliency
resilience
policy-based governance
Human behavior
pubcrawl
business data processing
security
Organizations
insider threat
biblio
Policy-Based Network Access and Behavior Control Management
Submitted by grigby1 on Mon, 03/29/2021 - 2:25pm
Protocols
Identity management
illegal outreach control
information network
integrated network access
management simplification
Network Access Control
network device
network servers
policy-based network access
process control
identity authentication
pubcrawl
resilience
Scalability
security
security management
security monitoring
security policies
security policy
Servers
behavior control model
Resiliency
composability
Predictive Metrics
abstract policy configuration
Access Control
application server
application system access control
authorisation
behavior control management
Networked Control Systems Security
behavior management control
behavior management control process
Communication networks
computer network management
data drive
Data Driven
data fusion
device connection
Human behavior
biblio
Research on Technology of Embedded System Security Protection Component
Submitted by grigby1 on Mon, 03/29/2021 - 12:03pm
log management
whitelist-based security protection
whitelist management
trusted computing technology
Trusted Computing
transport protocols
TCPIP
TCP/IP protocol
security policy management
security management system
security management
Resiliency
resilience
Qt graphical management interface
pubcrawl
Metrics
composability
Kernel
IoT devices
Internet of Things development
Internet of Things
graphical management interface
embedded systems
embedded system security protection
embedded security protection system
Cryptography
cryptographic algorithm
Computers
computer network security
computer network reliability
computer network performance evaluation
computer network management
biblio
A Dynamic Mechanism for Security Management in Multi-Agent Networked Systems
Submitted by grigby1 on Tue, 02/16/2021 - 12:44pm
Metrics
Strategic Agents
social surplus maximizing mechanism
social surplus maximization
Silicon
security management
Resiliency
resilience
pubcrawl
Probability distribution
private information
network theory (graphs)
network security
network coordinator
multi-agent systems
Social Agents
interdependent valuations
interconnected multiagent networked systems
inter-temporal correlations
incentive compatibility
dynamic networks
dynamic mechanism design problem
dynamic mechanism design
Cost accounting
computer security
computer networks
computer network security
composability
Communication networks
agents security state
biblio
A Reliable Ring Analysis Engine for Establishment of Multi-Level Security Management in Clouds
Submitted by grigby1 on Fri, 11/20/2020 - 2:14pm
ring analysis engine
trust boundaries
syntactic analysis
structural index
service provider
Semantics
Semantic Mapping
semantic analysis
security requirements
Security Policies Analysis
security of data
security mechanism
security management
security levels
security
Cloud Computing
Reliability
pubcrawl
Protocols
policy-based governance
policy management framework
Policy Management
multilevel security management
mapping process
indexing
Indexes
index-based engine
Engines
collaboration
cloud customers
biblio
Design and Realization of a Computer Security Control Circuit for Local Area Network
Submitted by aekwall on Mon, 05/04/2020 - 11:22am
control unit
Networked Control Systems Security
security threat
secure hard disk
ordinary hard disk
new technology challenge
network attack
management defect
local area network computer security control circuit
LAN security
LAN computers
LAN computer security control circuit
Hard disks
cyberattack
Circuit synthesis
circuit design
Predictive Metrics
security management
Local area networks
Information systems
composability
pubcrawl
Resiliency
information security
computer network security
biblio
Multi-Tenancy-Capable Correlation of Security Events in 5G Networks
Submitted by aekwall on Mon, 05/04/2020 - 11:07am
multitenancy-capable correlation
5G networks
Network Security Architecture
5G mobile networks
correlation workflow
event processing
infrastructure-as-a-service cloud providers
mobile network operators
multi-tenancy management
security management
multitenancy-capable event correlation architecture
multitenancy-capable management architectures
network-slice-centric security event correlation
security management systems
software-as-a-service providers
telecommunication service providers
telecommunication services
Monitoring
network slicing
NFV
security events
telecommunication computing
5G mobile communication
Stakeholders
Correlation
pubcrawl
Resiliency
computer network management
computer architecture
mobile computing
security
telecommunication security
Cloud Computing
biblio
On the Impact of Generative Policies on Security Metrics
Submitted by aekwall on Mon, 04/13/2020 - 10:13am
Security Metrics
security policies generation
policy basedsecurity management
generative policy based system
administrative overhead
Manuals
complex systems
security policies
security management
computer network security
Measurement
computer security
Grammar
policy-based governance
pubcrawl
computer network management
Access Control
authorisation
biblio
Security and Trust Issues on Digital Supply Chain
Submitted by grigby1 on Thu, 03/12/2020 - 12:08pm
pubcrawl
Trusted Computing
trust problems
trust issues
Traceability
System performance
supply chains
supply chain security
supply chain management
security of data
security management
security
Scalability
Resiliency
resilience
Reliability
advanced information technologies
Pervasive Computing Security
Internet of Things
information technology
information science
Human behavior
History
exploratory investigation
digital supply chain system
digital supply chain management system
digital supply chain
composability
Cloud Computing
blockchain
Automated Response Actions
« first
‹ previous
1
2
3
4
5
next ›
last »