Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bibliographies
biblio
ML-based NIDS to secure RPL from Routing Attacks
Submitted by aekwall on Mon, 11/29/2021 - 1:53pm
security
IoT
Routing
Protocols
real-time systems
Conferences
pubcrawl
Resiliency
composability
Bibliographies
6LoWPAN
Topology
RPL
LLNs
NIDS for RPL
biblio
A Systematic State-of-the-Art Analysis of Multi-Agent Intrusion Detection
Submitted by aekwall on Wed, 08/11/2021 - 2:29pm
computer architecture
Intrusion Detection
computer networks
pubcrawl
Resiliency
composability
computer security
Systematics
attacks
Bibliographies
cyberphysical system
IDS architectures
malware
multi-agent
review
intrusion tolerance
biblio
AI in Cybersecurity Education- A Systematic Literature Review of Studies on Cybersecurity MOOCs
Submitted by grigby1 on Tue, 05/25/2021 - 2:35pm
AI
Bibliographies
computer security
cyber education
cyber physical systems
Cybersecurity
cybersecurity education
education
machine learning
MOOC
privacy
pubcrawl
systematic literature review
Systematics
biblio
Towards an Improved Understanding of Human Factors in Cybersecurity
Submitted by aekwall on Mon, 10/12/2020 - 11:45am
security of data
Human behavior
pubcrawl
Cybersecurity
Bibliographies
computer security
psychology
Human Factors
social aspects of automation
cybersecurity-human-factors-personality-culture-demographics
human factor
secure digital environments
sociotechnical aspects
Human Behavior and Cybersecurity
biblio
The Impact of Time Pressure on Human Cybersecurity Behavior: An Integrative Framework
Submitted by aekwall on Mon, 10/12/2020 - 11:42am
Australia
Human Behavior and Cybersecurity
time pressure
thematic analysis
semi-structured interviews
integrative framework
insecure HCS behavior
human cybersecurity behavior
cybersecurity incidents
cybersecurity experts
cybersecurity contexts
security of data
Human Factors
Stakeholders
computer security
Interviews
Bibliographies
Cybersecurity
pubcrawl
Human behavior
Task Analysis
biblio
Information Security Policy Perceived Compliance Among Staff in Palestine Universities: An Empirical Pilot Study
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
planned behaviour theory
Instruments
ISP
Least squares approximations
Mathematical model
Metrics
organisational aspects
Palestine university staffs
partial least squares structural equation modelling
Personnel
insider threat
PLS-SEM
policy-based governance
protection motivation theory
pubcrawl
resilience
Resiliency
security of data
statistical analysis
General Deterrence Theory
appraisal
Bibliographies
collaboration
Communications technology
compliance behaviour
data collection method
Educational institutions
employees
Security Policies Analysis
government policies
Human behavior
Human Factors
information reinforcement theory
information security
information security policy
Information Security Policy Awareness
information security risks mitigation
biblio
A preliminary approach towards the trust issue in cloud manufacturing using grounded theory: Defining the problem domain
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
information management
Trusted Computing
trust topic
trust issue
trust
supply chains
structured literature review
pubcrawl
production engineering computing
noncommittal phase
manufacturing
integrative phase
Bibliographies
grounded theory method approach
grounded theory
Computing Theory and Trust
Compositionality
composability
collaboration
cloud manufacturing trust
cloud manufacturing
Cloud Computing
Buildings
biblio
The Identification of Supplier Selection Criteria Within a Risk Management Framework Towards Consistent Supplier Selection
Submitted by aekwall on Mon, 02/25/2019 - 11:43am
pattern matching
Supply Chain Risk Assesment
triangulation model
train manufacturer
supplier selection criteria
supplier risk assessment.
structured supplier risk assessment
Stability criteria
South Africa
source information
risk management framework
pubcrawl
organisational aspects
Interviews
document analysis
Bibliographies
supply chains
supply chain management
risk management
standards
Metrics
biblio
Beyond technical data - a more comprehensive situational awareness fed by available intelligence information
Submitted by BrandonB on Tue, 05/05/2015 - 12:38pm
information collection fusion
vulnerability information
threat information
technical data
Solids
situational awareness
security of data
military information providers
military environment
malware
intelligence processing
intelligence information
intelligence
information sources
information resources
adversary capabilities
information categories
Decision Making
decision makers
cyber threats
cyber space
cyber intelligence
cyber incidents
cyber analysis
cyber
Context
civil information providers
civil environment
Charge coupled devices
Bibliographies
« first
‹ previous
1
2