Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Information services
biblio
The Method of Assessing the Level of Compliance of Divisions of the Complex Network for the Corporate Information Security Policy Indicators
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
Information systems
the ratio of Pareto
the Hamming distance
the accounts of the Board
Standards organizations
security of data
risk minimization
risk management
ranking of the values of indicators
pubcrawl
policy-based governance
Policy Based Governance
Organizations
maximin and minimax procedures
collaboration
Information services
information security
Games
decision-making
Decision Making
criteria
corporate information system
corporate information security policy requirements
corporate information security policy indicators
compliance level assessment
complex networks
complex network
comparative assessment
biblio
Trustworthiness Optimization of Industrial Cluster Network Platform Based on Blockchain
Submitted by aekwall on Mon, 03/11/2019 - 10:38am
Information services
trustworthiness optimization
trustworthiness
Trusted Computing
smart contracts
small-to-medium enterprises
small and medium-sized enterprises
security of data
pubcrawl
optimization
optimisation
network platform
information trustworthiness
Analytical models
information service platform
Industries
industrial cluster network platform
industrial cluster
Economics
Distributed databases
data layer
composability
collaboration
blockchain
Application Layer
biblio
Analysis of computer security incidents using fuzzy logic
Submitted by grigby1 on Fri, 10/26/2018 - 5:00pm
information security
the development of cyber-attack signatures
security
Russian ViPNet technology
Russian Federation
Resiliency
recommender systems
pubcrawl
Protocols
processing algorithm
Metrics
Information services
Algorithm design and analysis
Fuzzy logic
digital signatures
detection and prevention of cyber-attacks
design pattern SOPKA
cyberattacks
cyber-attacks
Computers
computer security incidents
computer security incident analysis
computer security
author signatures
biblio
Ambiguity as a Barrier to Information Security Policy Compliance: A Content Analysis
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Natural languages
Usable Security
text analysis
South Africa
Software
Security policy compliance
security policies
security of data
pubcrawl
policy-based governance
Policy human aspects
Policy clarity
Policy ambiguity
Policy
collaboration
institutional information resources
InfoSec policy document
Information services
information security policy compliance
information security
Guidelines
Government
Governance
Educational institutions
educational institution
education
Content analysis
biblio
Security solutions for Web Service attacks in a dynamic composition scenario
Submitted by BrandonB on Tue, 05/05/2015 - 8:44am
SOAPAction spoofing
security
security solutions
service oriented architecture
service-oriented architecture
Simple object access protocol
SOA
SOAP
SOAP messages
schema validation
standards
UDDI
Web service attacks
web services
WS-Addressing spoofing
WSAS API
WSDL
XML injection
Information services
application program interfaces
authentication
authorisation
authorization
confidentiality
data integrity
dynamic composition scenario
Electronic publishing
API
integrity
internet
Lead
nonrepudiation
Protocols
SAS API
schema hardening
« first
‹ previous
1
2