Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Information systems
biblio
Interledger for the Industrial Internet of Things
Submitted by grigby1 on Tue, 12/01/2020 - 2:01pm
information exchange
socio-economic effects
smart grid security
pubcrawl
production engineering computing
manufacturing systems
ledger technology
Internet-of-Things devices
Internet of Things
Information systems
blockchain
Industrial Internet of Things
industrial internet
industrial information systems
human trust
Human behavior
hierarchical information flow
Distributed Ledger Technology
distributed ledger technologies
biblio
Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model Enhancement
Submitted by grigby1 on Fri, 11/20/2020 - 2:27pm
Information systems
Servers
security risks
Security Policies Analysis
risk management
risk assessment model
risk assessment approach
risk assessment
RBAC
pubcrawl
policy-based governance
model enhancement
Access Control
information system security
Databases
Database Security
correlation links
Correlation
authorisation
Anomalies Correlation
access control service
access control policy
access control policies management
biblio
Security Requirements for Cloud-based C4I Security Architecture
Submitted by grigby1 on Fri, 11/20/2020 - 2:25pm
national innovation
US military
Task Analysis
Servers
security vulnerabilities
security requirements
Security Policies Analysis
security of data
secure security architecture
public sector
pubcrawl
policy-based governance
Cloud Computing
national defense command control system
military computing
Korea national defense information system
Korea Military
Information systems
computer security
command and control systems
Cloud-based C4I Security Requirements
cloud-based C4I security architecture
cloud computing technology
cloud computing system
biblio
An Resilient Cloud Architecture for Mission Assurance
Submitted by aekwall on Mon, 11/16/2020 - 2:50pm
cyber physical environment
Resilient Security Architectures
Resiliency
resource situation generation
resource planning
resilient dual loop architecture
resilient cloud environment
resilient cloud architecture
resilient cloud
perception analysis planning adjustment
mission assurance system deployment mechanism
environment awareness network
dual loop architecture
security of data
complex cyber threat environment
Mission Assurance
cyber threat
Information services
information system
resilience
Information systems
Planning
pubcrawl
computer architecture
Cloud Computing
Monitoring
biblio
An Example of a Cybersecurity Education Model
Submitted by grigby1 on Wed, 11/04/2020 - 1:44pm
experts
security of data
pubcrawl
privacy
information technology perspective
information technology
Information systems
higher education training
further education
competencies
education
cybersecurity education model
cybersecurity education
Cybersecurity
cyber physical systems
curriculum
computer aided instruction
biblio
Determinants of E-Government Use in Developing Countries: The Influence of Privacy and Security Concerns
Submitted by grigby1 on Fri, 10/16/2020 - 11:13am
pubcrawl
influencers
Information systems
innovation management
organisational aspects
perceived usefulness
policy-based governance
privacy
privacy calculus
Human behavior
resilience
Resiliency
rural settings
security
security of data
security risks
South Africa
urban settings
E-Government
collaboration
consumer behaviour
contestable challenges
cultural aspects
cultural differences
Cybersecurity
data privacy
developing countries
citizens
e-government service
Electronic government
electronic-government
firm research
government data processing
government use
Hofstede cultural theory
biblio
A Study on The Factors Affecting The Continuous Use of E-Government Services - Focused on Privacy and Security Concerns-
Submitted by grigby1 on Fri, 10/16/2020 - 11:10am
security
privacy concerns
pubcrawl
quality factors
Quality of E-Government Services
quality of service
Reliability of E-government
resilience
Resiliency
risk factors
privacy
security concerns
service quality
Smart PLS
SPSS
system quality
TAM
technology acceptance model
user satisfaction
User satisfaction of E-Government Services
government data processing
Acceptance intention of E-government
collaboration
continuous use intention
Cybersecurity
data privacy
E-Government
e-government service
e-government services
Electronic government
4th Industrial Revolution
Human behavior
information and communication technology
information quality
information system
Information systems
internet
IS access model
Personnel
policy-based governance
biblio
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
Submitted by aekwall on Tue, 09/08/2020 - 10:12am
chaotic system
traditional cryptography algorithms
symmetric encryption
symmetric cipher
Salsa20
pseudorandom keys
NIST suite
hybrid modified lightweight algorithm
generated sequence keys
cryptography algorithms PRESENT
cipher algorithm
block ciphers
2D logistic map
lightweight cryptography
data communication
chaotic cryptography
Cryptography
chaotic communication
Predictive Metrics
information technology
stream cipher
Ciphers
Constrained Devices
Information systems
computational complexity
NIST
composability
pubcrawl
Resiliency
Classification algorithms
encryption
biblio
Markov Models of Cyber Kill Chains with Iterations
Submitted by aekwall on Tue, 09/08/2020 - 9:59am
Information systems
Weapons
targeted cyber-attack processes
targeted cyber attacks
stochastic models
security of data
Scalability
Resiliency
Reconnaissance
pubcrawl
Markov processes
Markov Models
Chained Attacks
homogeneous continuous time Markov chains
homogeneous continuous time Markov chain
cyber-attacks life cycles
cyber-attack process
cyber-attack life cycle
cyber-attack kill chains
cyber threats
cyber kill chains bases
cyber kill chain with iterations
command and control systems
biblio
An Evaluation of Information Connection in Augmented Reality for 3D Scenes with Occlusion
Submitted by grigby1 on Fri, 08/28/2020 - 12:31pm
occlusion
visualization
visual interruptions
virtual information display
Three-dimensional displays
spatial overlays
security requirements
Scalability
resilience
pubcrawl
proximity
privacy
perception
partial occlusion connection lines
3D scenes
maintenance engineering
Information systems
information connection evaluation
industrial augmented reality applications
Human behavior
Engines
encoding
data visualisation
Context
Color
augmented reality
anchors
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »