Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyberspace security
biblio
Research on New Power System Network Security Guarantee System
Submitted by grigby1 on Fri, 08/25/2023 - 10:34am
composability
sustainable protection model
New power system
Early warning and emergency response
cyberspace security
Human Factors
power systems
Cyberspace
Power measurement
emergency services
Compositionality
network security
Monitoring
Information Assurance
Industries
Computational modeling
Scalability
Resiliency
resilience
collaboration
policy-based governance
Metrics
Human behavior
pubcrawl
biblio
Distributed Threat Intelligence Sharing System: A New Sight of P2P Botnet Detection
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
Human Factors
Threat intelligence sharing
threat intelligence
telecommunication traffic
standards
security
Scalability
Resiliency
pubcrawl
Peer-to-peer computing
peer-to-peer botnet detection
peer to peer security
P2P botnet detection
network traffic analysis
Metrics
invasive software
botnets
Hidden Markov models
evaluating system
distributed threat intelligence sharing system
distributed methods
distributed cyber threat
distributed botnet
cyberspace security
Cyberspace
computer network security
Clustering algorithms
botnet
BAV quantitative TI model
analytic hierarchy process
AHP and HMM based analysis algorithm
biblio
Literature review of different contention of E-commerce security and the purview of cyber law factors
Submitted by grigby1 on Tue, 03/07/2017 - 1:32pm
Information systems
security privacy policy
security
pubcrawl170109
privacy
legislation
jurisdiction
IT
internet
information technology
Business
electronic commerce
e-consumer protection
E-Commerce Security
e-commerce law
data privacy
cyberspace security
cyber-crime activity
cyber law factor
Computer crime