Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
US Department of Defense
biblio
The Most Common Control Deficiencies in CMMC non-compliant DoD contractors
Submitted by grigby1 on Fri, 06/09/2023 - 1:13pm
US Department of Defense
Cybersecurity Damage Assessment
Security Control Deficiency
NIST SP 800–171
Control Family
CMMC
US Department of Homeland Security
Assessment
Resiliency
pubcrawl
mitigation
Regulation
Accreditation
Data Security
NIST
Computational modeling
resilience
biblio
Metrics to Meet Security amp; Privacy Requirements with Agile Software Development Methods in a Regulated Environment
Submitted by grigby1 on Mon, 08/02/2021 - 3:41pm
Agile software development
Communication system security
data privacy
Design tools and techniques
Iterative methods
Measurement
Metrics
metrics testing
pubcrawl
real-time and embedded systems
security
Software
Software measurement
tools
US Department of Defense
biblio
Metrics to Meet Security Privacy Requirements with Agile Software Development Methods in a Regulated Environment
Submitted by grigby1 on Tue, 04/27/2021 - 2:40pm
real-time and embedded systems
US Department of Defense
tools
Software measurement
Software
security
Scalability
Resiliency
resilience
Agile software development
pubcrawl
Metrics
Iterative methods
Design tools and techniques
data privacy
Communication system security
Big Data
biblio
Neural Style Transfer for Picture with Gradient Gram Matrix Description
Submitted by aekwall on Mon, 02/01/2021 - 11:42am
neural style transfer
texture style
texture expression
texture details
stylized pictures
style loss
picture stylize
output stylized picture
muddiness
gradient gram matrix description
Gradient Gram matrix
Gradient Gram description
art style transfer
Scalability
Electrical Engineering
image texture
US Department of Defense
Predictive Metrics
Image reconstruction
automation
matrix algebra
pubcrawl
Resiliency
Runtime
Internet of Things
biblio
Merging DoDAF architectures to develop and analyze the DoD network of systems
Submitted by aekwall on Mon, 05/11/2020 - 11:28am
merging
Systems engineering and theory
system-to-system matrix
system architectures
network metrics
military communication
Joint Interoperability and Capability Development System process
DoD network of systems
DoD legacy systems
DoD leadership
DoD Information Network
DoD Architecture Framework products
Department of Defense
network accountability
computer architecture
information networks
US Department of Defense
open systems
social network analysis
interoperability
military computing
Software Architecture
Measurement
Metrics
social networking (online)
composability
pubcrawl
Resiliency
biblio
Securing HPC using Federated Authentication
Submitted by aekwall on Mon, 02/10/2020 - 12:03pm
PKI
the U.S. Government PKI
multifactor authentication process
Multi-factor authentication
In Common Federation
HPC system security
federated identity management
federated authentication
external federated identity management systems
basic account maintenance
multifactor authentication
US Department of Defense
public key infrastructure
authorisation
Portals
Human Factors
parallel processing
High performance computing
message authentication
authentication
metadata
Metrics
pubcrawl
Resiliency
learning (artificial intelligence)
security
biblio
Cyber deterrence in times of cyber anarchy - evaluating the divergences in U.S. and Chinese strategic thinking
Submitted by aekwall on Wed, 12/18/2019 - 2:37pm
Human behavior
war-fighting
US Department of Defense
U.S. strategic thinking
U.S. government
strategic cultures
Sino-U.S. cyber interactions
security of data
Scalability
resilience
pubcrawl
programmable logic arrays
People’s Liberation Army
national contexts
Instruments
Beijing
Economics
Deterrence
Cyberspace
cyber warfare
cyber threats
cyber strategy
cyber domain
cyber deterrence
cyber conflict
Cyber Attacks
cyber anarchy
Context
Chinese strategic thinking
China
biblio
A virtual laboratory approach for risk assessment of aerospace electronics trust techniques
Submitted by grigby1 on Mon, 12/03/2018 - 1:51pm
supply chain management
pubcrawl
Reliability
resilience
Resiliency
risk management
Scalability
semiconductor technologies
space vehicle electronics
procurement path
supply chain risk
supply chain risk assessment
supply chains
testing
trusted procurement options
US Department of Defense
virtual instrumentation
virtual laboratory approach
faulty component risk
aerospace electronic component risk assessment methodology
aerospace electronics trust techniques
aerospace testing
component criticality risk tolerance
component testing
Consumer electronics
counterfeit mitigation calculations
counterfeit risk
actionable decision data
Logistics
Metrics
microelectronics trust assurance
mitigation strategies
nontrusted procurement options
optimal test
part reliability
Procurement
biblio
Analysis of Identity and Access Management alternatives for a multinational information-sharing environment
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
Linear programming
US Department of Defense
technological solutions
technical factor
systems engineering
Scalability
Resiliency
Reliability
pubcrawl
political factors
operational factor
National security
multinational information sharing environment
military computing
military communication
access management alternative
Joint Information Environment
Identity management
identity and access management technologies
Identity and Access Management
identity analysis alternative
Human behavior
Governance protocols
Economics
economic factor
Cybersecurity
computer security
authorization
authorisation
Australia
biblio
System security engineering vulnerability assessments for mission-critical systems and functions
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
supply chains
vulnerability identification
vulnerability assessment
US Department of Defense
testing
Systems engineering and theory
systems engineering
system security engineering vulnerability assessments
system security engineering
system security
system maturity points
Databases
Software
security of data
security
pubcrawl170112
mission-critical systems
mission-critical functions
military computing
DoD
Department of Defense
defense systems
1
2
next ›
last »