Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
best practices
biblio
Cybersecurity Education in the Age of Artificial Intelligence: A Novel Proactive and Collaborative Learning Paradigm
Submitted by grigby1 on Thu, 08/24/2023 - 1:49pm
Artificial Intelligence
Human Factors
Cyber Physical System
Learning systems
federated learning
cyber physical systems
education
Context modeling
immersive systems
virtual reality
best practices
Training
computer security
composability
privacy
Resiliency
resilience
Human behavior
pubcrawl
machine learning
Cyber-security
biblio
SECOM: Towards a convention for security commit messages
Submitted by grigby1 on Wed, 08/16/2023 - 2:42pm
security
pubcrawl
resilience
Resiliency
Software
composability
Data mining
IDS
best practices
convention
security commit messages
Standard
biblio
MAF: A Framework for Modular Static Analysis of Higher-Order Languages
Submitted by aekwall on Sun, 10/16/2022 - 5:24pm
visualization
Dynamic scheduling
Conferences
pubcrawl
Resiliency
Human behavior
composability
Performance analysis
static analysis
debugging
static code analysis
best practices
modular analysis
static program analysis
biblio
The Analysis of Human Attitude toward Cybersecurity Information Sharing
Submitted by grigby1 on Thu, 09/29/2022 - 3:38pm
Organizational learning
Management
vulnerabilities
Bibliographies
information sharing
attitude
behavior
Human Attitude
involvement
best practices
Organizations
pubcrawl
Human behavior
computer security
Cyber-security
Cybersecurity
taxonomy
biblio
Digital Forensics and Incident Response (DFIR) Challenges in IoT Platforms
Submitted by grigby1 on Mon, 06/06/2022 - 11:14am
Scalability
DFIR
Resiliency
best practices
Task Analysis
Metrics
computer security
standards
IoT security
Internet of Things
Hardware
resilience
Human behavior
pubcrawl
IoT
Incident Response
Digital Forensics
biblio
Key Practices in Cyber Supply Chain Risk Management: Observations from Industry
Submitted by willirn1 on Tue, 10/26/2021 - 9:30am
best practices
C-SCRM
cyber supply chain risk management
external dependency management
ICT SCRM
Information and Communication Technology Supply Chain Risk Management
key practices
risk management
supplier
Supply Chain
supply chain assurance
supply chain risk
supply chain risk assessment
supply chain risk management
supply chain security
third-party risk management
biblio
SIDE: Security-Aware Integrated Development Environment
Submitted by grigby1 on Tue, 10/12/2021 - 1:47pm
best practices
Buildings
code smells
integrated development environment
Metrics
Monitoring
Predictive models
predictive security metrics
pubcrawl
security
Software
software metrics
software security
tools
biblio
Security Related Technical Debt in the Cyber-Physical Production Systems Engineering Process
Submitted by aekwall on Mon, 10/12/2020 - 10:37am
pubcrawl
Technical Debt in the context of Security
technical debt
systems engineering
standards
software reliability
software maintenance
Software
security related technical debt
security related issues
security of data
security
Scalability
Resiliency
False Data Detection
Production systems
production engineering computing
product quality
maintainability
Human behavior
gold standard
Expert Systems and Security
cyber-physical systems
cyber-physical production systems engineering
cyber physical production systems
Computer bugs
best practices
biblio
Designing Security-Aware Service Requests for NFV-Enabled Networks
Submitted by grigby1 on Fri, 04/17/2020 - 9:29am
service function chains
Resiliency
resource allocation
resource allocation problem
resource management
security
security aspects
security of data
security requirements
security-aware service request design
resilience
software images
specialized hardware appliances
Substrates
supported service
Switches
virtualisation
Virtualization
virtualization privacy
load-balancers
best practices
Cloud Computing
cloud-based applications
composability
Hardware
high-volume servers
Human behavior
Human Factors
initial SFC requests
Bandwidth
Metrics
network function virtualization
network functions
network service request
NFV environment
NFV-enabled networks
privacy
pubcrawl
biblio
Balancing Organizational Incentives to Counter Insider Threat
Submitted by aekwall on Wed, 05/08/2019 - 8:47am
positive incentives
negative incentives
organisational aspects
organizational aspects
organizational context
organizational supportiveness
Organizations
perceived organizational support
Personnel
Monitoring
psychology
pubcrawl
resilience
security of data
sociotechnical systems
software engineering
traditional security practices
workforce management practices
Engagement
balanced combination
balances organizational incentives
balancing organizational incentives
best practices
computer security
contracts
dysfunctional management practices
employee welfare
authorisation
Human behavior
human resources management
insider threat
insider threat program
insider wrongdoing
Metrics
missing dimension
1
2
next ›
last »