Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Information systems
biblio
The Information Processing in the Cybernetic Environment of Signals Intelligence
Submitted by aekwall on Mon, 03/25/2019 - 9:58am
information and communication technology
signal processing security
Signals Intelligence
Signal Intelligence
military operations
military computing
intelligence information
Information systems
information processing system
information processing
information processes
Resiliency
electronic warfare
Cyberspace
cybernetics
cybernetic environment
Decision Making
Metrics
component
composability
pubcrawl
biblio
Architecture of the Honeypot System for Studying Targeted Attacks
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
Organizations
Task Analysis
targeted attacks
target attacks
Servers
security of data
Scalability
Resiliency
resilience
public domain software
pubcrawl
organized criminal groups
computer architecture
malware
Information systems
information security systems
information resources
Human Factors
Human behavior
honeypot system
honey pots
financial organizations
computer information
Computer crime
biblio
A Command-by-Intent Architecture for Battlefield Information Acquisition Systems
Submitted by grigby1 on Mon, 12/10/2018 - 11:34am
pubcrawl
military operations
mission information
mission information needs
mission success rate
mission-critical decision making
NATO-based mission scenario
network resources
operational mission goals
Prefetching
military computing
real-time information collection
resilience
Resiliency
Scalability
sensor fusion
Sensor Systems
subordinate units
target tracking
target tracking application
Decision Making
Bandwidth
battlefield information acquisition systems
cache storage
Command-by-intent
command-by-intent architecture
commander intent
data fusion system
Data integration
decision authority
Anglova
Decision trees
Decision-centric
forwarding caching relevant data
Human Factors
information needs
Information systems
Internet of battlefield things
iobt
biblio
Design pattern for secure object oriented information systems development
Submitted by grigby1 on Thu, 08/23/2018 - 11:57am
Metrics
user interface
Secure Software Design
secure object oriented information systems development
Secure Information Systems
object-oriented methods
object oriented design patterns
object oriented design framework
Design patterns
data availability
application security
object-oriented programming
Resiliency
security
data integrity
resilience
Unified modeling language
Information systems
Software
security of data
composability
data confidentiality
information security
pubcrawl
cyber-physical systems
Concurrency
biblio
Foresighted Deception in Dynamic Security Games
Submitted by grigby1 on Mon, 04/02/2018 - 12:40pm
optimization
Stochastic processes
stochastic games
stochastic deception game
security protection
security of data
security
SDG
Resiliency
resilience
pubcrawl
policy-based governance
Artificial Neural Networks
myopic deception
Metrics
learning (artificial intelligence)
Iterative methods
iterative algorithm
Information systems
Heuristic algorithms
Games
dynamic security games
Data protection
biblio
Studying cyber security threats to web platforms using attack tree diagrams
Submitted by K_Hooper on Wed, 02/14/2018 - 11:59am
information technology
WordPress vulnerabilities
WordPress platform
Web platforms
Web platform
trees (mathematics)
security threats
security personnel
security of data
Scalability
Resiliency
pubcrawl
Organizations
Open Source Software
Metrics
internet
artificial intelligence security
information systems designers
Information systems
Human behavior
graphical analysis
global reference system
cyber-attack
cyber security threats
Computers
computer system
computer security threats
computer security
common vulnerabilities
Attack Tree method
attack tree diagrams
attack tree
biblio
Towards Automation in Information Security Management Systems
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
small and medium-sized enterprises
Process Automation
pubcrawl
Resiliency
risk management
Scalability
security controls automation
security of data
security requirements
Metrics
small-to-medium enterprises
Stakeholders
standards
tools
ubiquitous computing
Ubiquitous Computing Security
workflow enactment
information protection
automated process execution
automation
context-aware ISMS
continuous risk-driven ISMS
Data protection
highly interconnected information security management
Human behavior
Human Factors
ADAMANT
information security
Information Security Management System
information security management systems
Information Security Risk Management
Information systems
ISMS related activities
ISO 27001 compliant ISMS
biblio
Entropy-Based Security Analytics: Measurements from a Critical Information System
Submitted by grigby1 on Tue, 02/06/2018 - 1:33pm
Information systems
text analytics
security of data
security
Scalability
Runtime
real-world air traffic control information system
pubcrawl
operating systems
Metrics
log analytics
Intrusion Detection
air traffic control
Human Factors
Human behavior
Filtering
Event logging
entropy-based security analytics
Databases
Data mining
data analytics framework
critical information system
composability
biblio
Towards a conceptual framework for information security digital divide
Submitted by grigby1 on Tue, 01/23/2018 - 3:28pm
Information systems
theoretical levels
system end-users
Standards organizations
security governance
pubcrawl
project management
policy-based governance
Policy
organization security maturity
Organizations
organizational level
organisational aspects
Maturity Capability
access control management approach
information system
Information Security Maturity Level
information security fundamentals
information security digital divide maturity framework
Information Security Digital Divide
information security
Frameworks
Digital divide
critical success factors
conceptual framework
collaboration
Benchmarking
authorisation
biblio
Requirement analysis and descriptive specification for exploratory evaluation of information system security protection capability
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
information system security protection capability
uncertainty
specification description
Security Policies Analysis
security of data
security
requirement analysis
pubcrawl
protective equipment
protection policy
policy-based governance
Information systems
information system structure model
Analytical models
Granular Computing theory
granular computing
Formal Specification
exploratory evaluation requirements
exploratory evaluation process
exploratory evaluation description problem
exploratory evaluation
descriptive specification
description specification
Computational modeling
collaboration
Business
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »