Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Information systems
biblio
Provably Robust Decisions based on Potentially Malicious Sources of Information
Submitted by aekwall on Tue, 10/12/2021 - 3:13pm
security
Robustness
Routing
pubcrawl
Resiliency
Decision Making
Compositionality
malware
Predictive Metrics
provable security
cognition
Information systems
malicious reporting
Provable robustness
trust-based security
biblio
Partial Decision Overrides in a Declarative Policy Framework
Submitted by grigby1 on Tue, 10/12/2021 - 2:53pm
privacy
Vocabulary
semantic technology
Semantics
Scalability
rule
reasoning
pubcrawl
Privacy Policies
privacy framework
automated reasoning
policy decision engine
Policy
Ontology
Ontologies
Information systems
Human behavior
Engines
data sharing
data privacy
biblio
On Providing Information Security for Decentralized Databases
Submitted by grigby1 on Mon, 10/04/2021 - 3:03pm
database
role-based access control method
Public key
Permission
Object recognition
Information systems
information security
graph-oriented model
decentralized storage
object oriented security
Data models
consensus for accepting changes
blockchain
Access Control
pubcrawl
Metrics
composability
Resiliency
biblio
Graphical Semantic Authentication
Submitted by grigby1 on Thu, 09/30/2021 - 11:09am
OWL
multifactor authentication
Metrics
Iris recognition
Information systems
Human Semantic Authentication
Human Factors
Human behavior
Graphical semantic authentication
Graphical Authentication
authentication
Semantics
Robustness
Resiliency
resilience
pubcrawl
biblio
PRIPRO:Solution for user profile control and management based on data privacy
Submitted by grigby1 on Thu, 07/08/2021 - 2:36pm
pubcrawl
user privacy in the cloud
user privacy
Ubiquitous Systems
taxonomy
smart phones
Scalability
Resiliency
resilience
Androids
Privacy Profile
privacy
Metrics
internet
Information systems
Humanoid robots
Hardware
cloud
biblio
Demystifying the Cyber Attribution: An Exploratory Study
Submitted by aekwall on Thu, 05/13/2021 - 11:50am
machine learning algorithms
Human behavior
pubcrawl
composability
Metrics
tools
metadata
machine learning
data analysis
attribution
Cyber Attacks
Information systems
face recognition
Regulation
attack patterns
Cyber attributtions
biblio
The Security Policies Optimization Problem for Composite Information Systems
Submitted by grigby1 on Thu, 04/29/2021 - 2:15pm
Information systems
Task Analysis
security policy
security policies
security
policy-based governance
optimization
operating systems
mandatory access control
pubcrawl
information security
discretionary access control
Access Control
Metrics
composability
resilience
Resiliency
Operating systems security
biblio
Construction of Audit Internal Control System Based on Online Big Data Mining and Decentralized Model
Submitted by aekwall on Tue, 04/27/2021 - 1:29pm
Scalability
Big Data
security
Task Analysis
Data models
Resiliency
Human behavior
pubcrawl
Data mining
control systems
Information systems
Security Audits
data stream
decentralized model
Internal Control
biblio
Improvement of information System Audit to Deal With Network Information Security
Submitted by aekwall on Tue, 04/27/2021 - 1:27pm
Inspection
Scalability
Resiliency
Human behavior
pubcrawl
Penetration Testing
Business
Data mining
Information systems
Uniform resource locators
Security Audits
Zirconium
Information System Audit
network information security
biblio
Information security risk assessment based on decomposition probability via Bayesian Network
Submitted by aekwall on Tue, 04/27/2021 - 1:10pm
Measurement
web security
Urban areas
security
risk management
risk assessment
Resiliency
pubcrawl
probability of cyberattacks
belief networks
IT security
Information systems
information security
Cybersecurity
cyberattack
cyber-physical systems
computer security
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »