Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Information systems
biblio
Development of a Model for Managing the Openness of an Information System in the Context of Information Security Risks of Critical Information Infrastructure Object
Submitted by grigby1 on Fri, 09/01/2023 - 1:21pm
composability
functional approach
critical information infrastructure facility
information resources
Human Factors
information security system
unauthorized access
Context modeling
information theoretic security
Compositionality
Information systems
collaboration
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
risk management
information security
biblio
Analysis of the random shuffling of message blocks as a low-cost integrity and security measure
Submitted by grigby1 on Fri, 04/14/2023 - 3:08pm
Memory management
Shuffling
Low cost
Brute force
Force measurement
brute force attacks
integrity
Current measurement
Force
Proposals
collaboration
Information systems
Cryptography
privacy
policy-based governance
Human Factors
Human behavior
pubcrawl
IoT
security
biblio
An Approach to Address Risk Management Challenges: Focused on IT Governance Framework
Submitted by aekwall on Fri, 01/13/2023 - 2:57pm
risk management
Security Risk Management
Strategic Alignment
Risk Management Model
risk assessment
IT Governance
IT Framework
Information systems
automation
resource management
Organizations
Resiliency
Metrics
Scalability
pubcrawl
resilience
information technology
Computer crime
Reliability
Human Factors
biblio
Fireasy: a tool to aid security policy modeling, translation and understanding firewall configuration
Submitted by aekwall on Fri, 01/13/2023 - 2:51pm
Metrics
Task Analysis
SPML2
security policies
security
Scalability
Resiliency
pubcrawl
PacketFilter
Companies
maintenance engineering
Information systems
Human Factors
Graphics
Firewalls (computing)
firewall rules visualization
Firewal
biblio
A Review on The Concerns of Security Audit Using Machine Learning Techniques
Submitted by grigby1 on Fri, 01/13/2023 - 12:46pm
control systems
IT
Propulsion
Security Audits
Productivity
cyber threats
Costs
cyber-attacks
Resistance
pubcrawl
security audit
Information systems
Scalability
Hardware
Software
Resiliency
resilience
Human behavior
biblio
Remote Disaster Recovery and Backup of Rehabilitation Medical Archives Information System Construction under the Background of Big Data
Submitted by grigby1 on Fri, 01/06/2023 - 3:32pm
computer architecture
pubcrawl
resilience
Resiliency
Urban areas
Big Data
Information systems
Data Security
data communication
Infectious diseases
system design
Rehabilitation Medical Archives Information
Remote Disaster Recovery
System recovery
biblio
Swarm Intelligence applied to SQL Injection
Submitted by aekwall on Thu, 01/05/2023 - 4:06pm
pubcrawl
composability
particle swarm optimization
Compositionality
Information systems
application security
SQL injection
Structured Query Language
Swam Intelligence
Vulnerabilities in Web Applications
Swarm Intelligence
biblio
Acceptable Variants Formation Methods of Organizational Structure and the Automated Information Security Management System Structure
Submitted by grigby1 on Fri, 09/30/2022 - 9:29am
Information systems
automated control systems
Resiliency
information protection
control
information theoretic security
Compositionality
Cybersecurity
Task Analysis
control systems
computer security
information security
composability
Scalability
Instruments
resilience
collaboration
policy-based governance
Human Factors
Human behavior
pubcrawl
biblio
Privacy Protection Method for Experts' Evaluation Ability Calculation of Peer Review
Submitted by grigby1 on Tue, 09/20/2022 - 12:27pm
pubcrawl
Human behavior
Scalability
privacy
data privacy
Information systems
computer security
Perturbation methods
privacy protection
usability
expert systems
Human Factors
Data Perturbation
evaluation ability
peer review
biblio
A Cyber Security Risk Assessment Methodology for CBTC Systems Based on Complex Network Theory and Attack Graph
Submitted by grigby1 on Fri, 08/26/2022 - 2:06pm
cyber security risk assessment
security
Scalability
risk management
Resiliency
pubcrawl
Information systems
Human Factors
Human behavior
Security Risk Management
Control Theory
control systems
Computers
Computer crime
complex networks
complex network theory
Communication-Based Train Control
attack graph
1
2
3
4
5
6
7
8
9
…
next ›
last »