Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Stakeholders
biblio
Implementation of Blockchain Based Distributed Web Attack Detection Application
Submitted by grigby1 on Fri, 09/18/2020 - 2:07pm
firewalls
command injection attacks
Co
web-based attacks
Web servers
Web platforms
web attack detection application
Web attack detection
web application firewalls
Stakeholders
signature based detection method
signature based detection
Cryptography
blockchain based web attack detection model
Reliability
Metrics
smart contracts
composability
internet
Resiliency
resilience
pubcrawl
Distributed databases
blockchain
biblio
Multi-Tenancy-Capable Correlation of Security Events in 5G Networks
Submitted by aekwall on Mon, 05/04/2020 - 11:07am
multitenancy-capable correlation
5G networks
Network Security Architecture
5G mobile networks
correlation workflow
event processing
infrastructure-as-a-service cloud providers
mobile network operators
multi-tenancy management
security management
multitenancy-capable event correlation architecture
multitenancy-capable management architectures
network-slice-centric security event correlation
security management systems
software-as-a-service providers
telecommunication service providers
telecommunication services
Monitoring
network slicing
NFV
security events
telecommunication computing
5G mobile communication
Stakeholders
Correlation
pubcrawl
Resiliency
computer network management
computer architecture
mobile computing
security
telecommunication security
Cloud Computing
biblio
Research on Traceability Algorithm of Logistics Service Transaction Based on Blockchain
Submitted by grigby1 on Thu, 03/12/2020 - 12:09pm
Logistics
Traceability algorithm
supply chains
supply chain security
supervision system
Stakeholders
Scalability
Resiliency
resilience
pubcrawl
multidimensional traceable data model
logistics service supply chain
Globe sandara 1
Human behavior
Globe standara 1
agricultural products
Asymmetric Encryption
blockchain
blockchain-based logistics service transaction traceability algorithm
business process
cryptocurrencies
Data Security
Distributed databases
biblio
Data Management in Supply Chain Using Blockchain: Challenges and a Case Study
Submitted by grigby1 on Thu, 03/12/2020 - 12:08pm
information retrieval
supply chains
supply chain security
supply chain management
Stakeholders
social benefits
Scalability
Resiliency
resilience
pubcrawl
production engineering computing
product tracing
Logistics
Access Control
Industries
Human behavior
financial management
financial benefits
environmental benefits
Distributed databases
data retrieval
data management
cryptocurrencies
blockchain-based SCM systems
blockchain-based food traceability system
blockchain
biblio
The Privacy Case: Matching Privacy-Protection Goals to Human and Organizational Privacy Concerns
Submitted by grigby1 on Mon, 03/09/2020 - 2:57pm
Smart Grid
privacy goals
privacy protection
privacy-protection goals
privacy-related risks
pubcrawl
resilience
Resiliency
Safety
Scalability
privacy
smart grid data processing
Smart Grid Privacy
smart grid stakeholder
smart grid stakeholders
Smart Grids
smart power grids
Software Architecture
Stakeholders
goals structuring notation
Aspern Smart City Research project
automotive domain
Automotive engineering
Buildings
collaboration
composability
data privacy
goal structuring notation
argumentation thread
Human behavior
Human Factors
human privacy concern
Metrics
organizational privacy concern
policy-based governance
power engineering computing
Power system protection
biblio
Criminal Profiling in Digital Forensics: Assumptions, Challenges and Probable Solution
Submitted by aekwall on Wed, 05/08/2019 - 9:42am
Human behavior
tools
Stakeholders
Scalability
resilience
pubcrawl
probable solution
Metrics
investigation
Internet technologies
internet
information forensics
Complexity theory
Digital Forensics
data privacy
Cyberspace
cybercriminals
cybercrime investigations
Cybercrime
cyber-scene
cyber scene
criminal profiling
Computer crime
biblio
Information Requirements for National Level Cyber Situational Awareness
Submitted by grigby1 on Thu, 03/28/2019 - 3:13pm
Information Assurance
Stakeholders
situational awareness
security of data
Resiliency
resilience
pubcrawl
nonadversarial service management mistakes
national level cyber situational awareness
national information assurance exercise
Metrics
information requirements
information elements
adversarial behavior
government officials
Government
Electronic mail
cyber situational awareness-decision-makers
cyber security
critical infrastructures
critical infrastructure
Crisis Management
Computer crime
composability
common operational picture
adversarial cyberattacks
biblio
Automating Threat Intelligence for SDL
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
open source threat information sources mining
Automated Secure Software Engineering
vulnerability disclosure
threat intelligence
tactical threat intelligence
Stakeholders
security development lifecycle
security community
SDL
product specific threat indicators
product security
product development
Product design
product deployment
security of data
IT infrastructure
Feeds
enterprise information technology infrastructure
software engineering
Data mining
Databases
composability
pubcrawl
Resiliency
security
malware
Conferences
biblio
Trustworthy Orchestration of Container Based Edge Computing Using Permissioned Blockchain
Submitted by grigby1 on Fri, 02/08/2019 - 4:35pm
smart contracts
Metrics
network accountability
open systems
Peer-to-peer computing
permissioned blockchain
Provenance
pubcrawl
resilience
Resiliency
IoT devices
Stakeholders
Trusted Computing
trustworthy orchestration
Trustworthy Systems
trustworthy transactions
velocity
verity
volume
W3C-PROV data model
context dependent data analysis
blockchain
blockchain container based architecture
business network
Cloud Computing
cloud resources
composability
computer architecture
container based edge computing
Containers
accountability
cyber physical systems
data analysis
decentralized interaction model
EC infrastructures
edge computing
Internet of Things
Internet of Things devices
IoT based applications
biblio
Cyber Security of Unmanned Aircraft System Traffic Management (UTM)
Submitted by grigby1 on Thu, 01/31/2019 - 12:12pm
pubcrawl
UTM cyber security
urban environments
unmanned aircraft system traffic management
UAS traffic management
sUAS vulnerabilities
Stakeholders
security threats
security of data
Resiliency
resilience
remotely piloted aircraft fly
remotely operated vehicles
Air gaps
paper bridges
Metrics
Human behavior
cyber security
computer security
composability
autonomous aerial vehicles
Aircraft navigation
Aircraft manufacture
aircraft control
Aircraft
air traffic control
« first
‹ previous
1
2
3
4
5
6
next ›
last »