Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Breach
biblio
Data Wiping Tool: ByteEditor Technique
Submitted by aekwall on Wed, 04/13/2022 - 10:19am
visualization
Data Breach
tools
pubcrawl
Scalability
privacy
testing
faces
Portable computers
bring your own device
ByteEditor
Randomized data
Wiping tool
data deletion
biblio
Automating Audit with Policy Inference
Submitted by grigby1 on Fri, 04/01/2022 - 1:33pm
Manuals
Security Audits
policy inference
logic
electronic medical records
auditing
Data Breach
Inference algorithms
Complexity theory
Organizations
Medical services
Access Control
Scalability
Resiliency
resilience
Human behavior
pubcrawl
biblio
Delegated Authorization Framework for EHR Services using Attribute Based Encryption
Submitted by aekwall on Tue, 01/25/2022 - 3:52pm
Data Breach
Organizations
Data models
attribute-based encryption
authorization
encryption
pubcrawl
Scalability
Human behavior
policy-based governance
Cloud Computing
Personnel
attribute based encryption
electronic medical records
Ontologies
biblio
Detection of Zero-Day Attacks in Network IDS through High Performance Soft Computing
Submitted by grigby1 on Tue, 12/21/2021 - 12:36pm
intrusion detection system
Zero day attacks
visualization
Soft Computing
Resiliency
resilience
pubcrawl
neural network
Metrics
composability
Intrusion Detection
Interference
High performance computing
Fuzzy logic
defense
Data Security
Data Breach
Computers
biblio
Deception Maze: A Stackelberg Game-Theoretic Defense Mechanism for Intranet Threats
Submitted by aekwall on Mon, 12/20/2021 - 12:22pm
game theory
simulation
resource management
Resiliency
pubcrawl
Organizations
Metrics
Human behavior
genetic algorithm
Games
game theoretic security
Deception Technology
Data Breach
Conferences
Computational modeling
advanced persistent threat
Scalability
Predictive Metrics
Human Factors
biblio
Biometrics Based Access Framework for Secure Cloud Computing
Submitted by grigby1 on Thu, 09/16/2021 - 4:06pm
authentication
authorization
biometrics
Cloud Computing
cloud computing security
Compositionality
Data Breach
Fingerprint recognition
framework
Metrics
pubcrawl
resilience
Resiliency
scientific computing
Scientific Computing Security
security
biblio
CloudStrike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure
Submitted by grigby1 on Thu, 09/16/2021 - 11:51am
cloud computing security
Cloud Security
Data Breach
pubcrawl
resilience
Resiliency
Resilient Architectures
Resilient Security Architectures
security chaos engineering
security risk assessment
tools
biblio
Energy and Cyber Security and Its Effect on Business Resiliency
Submitted by grigby1 on Thu, 09/16/2021 - 11:50am
Computers
Data Breach
Fuels
Oils
power generation
power transmission lines
pubcrawl
resilience
Resiliency
security
biblio
Preventing the Insider – Blocking USB Write Capabilities to Prevent IP Theft
Submitted by aekwall on Mon, 06/28/2021 - 12:41pm
composability
Data Breach
Drives
Image edge detection
Insider Risk
intellectual property
intellectual property security
Monitoring
Organizations
policy-based governance
pubcrawl
Resiliency
security
Universal Serial Bus
USB Drives
biblio
Responsibility Attribution Against Data Breaches
Submitted by aekwall on Thu, 05/13/2021 - 11:48am
Human behavior
pubcrawl
composability
Metrics
attribution
Access Control
Ontology
Cost Model
Data Breach
Electronic Crimes
policy model
Responsibility Attribution
« first
‹ previous
1
2
3
4
next ›
last »