Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Breach
biblio
Establishing a Zero Trust Strategy in Cloud Computing Environment
Submitted by grigby1 on Thu, 03/04/2021 - 3:04pm
cloud computing environment
zero trust
Zero Trust Strategy
Trust Management System
trust management mechanisms
Subjective Trust
static trust relationship
Objective Trust
Incipient Technology
conceptual zero trust strategy
Data Breach
cloud service providers
Trusted Computing
Cloud Computing
Scalability
data integrity
data privacy
data confidentiality
Resiliency
resilience
policy-based governance
Human Factors
pubcrawl
biblio
Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web
Submitted by grigby1 on Fri, 01/15/2021 - 12:22pm
dark web
Data Breach
Data collection
Human behavior
Human Factors
PII
privacy
pubcrawl
surface Web
biblio
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes
Submitted by grigby1 on Fri, 11/20/2020 - 2:26pm
post-breach security
zero risk appetite
Task Analysis
security theatre
Security Policies Analysis
security policies
security of data
security division
security culture
security controls
security breach
security behaviour
pubcrawl
Productivity
post-breach security changes
Companies
policy-based governance
Personnel
participatory action research
organization security division
organisational aspects
Investment
Interviews
humble inquiry
financial investment
financial data processing
employees
Data Breach
data analysis
biblio
PAVSS: Privacy Assessment Vulnerability Scoring System
Submitted by aekwall on Mon, 10/12/2020 - 11:31am
social engineering
Expert Systems and Privacy
Twitter data
privacy-breach vulnerability
Privacy Assessment Vulnerability Scoring System
Privacy assessment
PAVSS
online sources
online so cial networks
online platform
Federal Trade Commission
fair information practice principles
consumer information
cybersecurity experts
security of data
stored data
private data
Human Factors
Data Breach
Data Security
privacy
Twitter
social networking (online)
privacy attacks
pubcrawl
Human behavior
data privacy
Scalability
biblio
An SDN/NFV-Enabled Architecture for Detecting Personally Identifiable Information Leaks on Network Traffic
Submitted by grigby1 on Fri, 04/17/2020 - 10:24am
SDN/NFV-enabled architecture
NFV-enabled system
personally identifiable information detector
personally identifiable information leaks detection
privacy
privacy leaks
pubcrawl
resilience
Resiliency
SDN controllers
NFV MANO
Servers
social networking
software defined networking
software defined networking paradigm
software-based solutions
traffic intensity
unintended data disclosure
virtualisation
virtualization privacy
Human Factors
composability
computer architecture
computer network security
Data Breach
data breaches
data privacy
data-intensive nature
hardware-specific implementation
Human behavior
Cloud Computing
internet
leak detection
leak detection systems
load balancer
Measurement
Metrics
Middleboxes
network function virtualization
network traffic
biblio
Encrypted QR Code Based Optical Challenge-Response Authentication by Mobile Devices for Mounting Concealed File System
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
QR codes
QR code technologies
QR code exchanges
Portable computers
optical challenge-response authentication
optical challenge response
mounting concealed file system
mounting authentication scheme
mounting authentication
encrypted QR code
Data Breach
challenge-response scheme
mobile devices
private key cryptography
smart phones
public key cryptography
Mobile Security
cyber physical systems
message authentication
authentication
Cryptography
Ransomware
pubcrawl
Resiliency
mobile computing
invasive software
biblio
Endpoint Protection: Measuring the Effectiveness of Remediation Technologies and Methodologies for Insider Threat
Submitted by grigby1 on Tue, 01/21/2020 - 11:22am
Resiliency
resilience
pubcrawl
privacy
policy-based governance
Metrics
insider threat
Human behavior
Endpoint protection platform
Endpoint protection
Endpoint detection and response
data leakage
Data Breach
collaboration
biblio
Data Breach and Multiple Points to Stop It
Submitted by aekwall on Wed, 05/08/2019 - 9:46am
Access Control
Human behavior
pubcrawl
Metrics
insider threat
Anomaly Detection
software security
resilience
Data Breach
data loss prevention
inadvertent data leak
multiple point of prevention
Ransomware
Security Practices
system security
biblio
Dr. WATTson: Lightweight current-based Intrusion Detection (CBID)
Submitted by grigby1 on Mon, 11/20/2017 - 12:28pm
internet
Voltage measurement
Voltage Characteristics
Tamper-Resistance
Tamper resistance
SCADA systems
SCADA
Resiliency
resilience
pubcrawl
Power measurement
lightweight current-based intrusion detection
lightweight current-based IDS
knowledge-based detection
Intrusion Detection
batteries
integrated circuits
Industrial Control Systems
industrial control
IDS
ICs
false alarm rate
Dr. WATTson
Data Breach
Current measurement
Current Drain Intrusion Detection
computer network security
composability
CBID
behavior-based detection
biblio
Automated Parsing and Interpretation of Identity Leaks
Submitted by grigby1 on Mon, 03/20/2017 - 10:47am
automated parsing
composability
Data Breach
identity leak
password
pubcrawl
Security Awareness
« first
‹ previous
1
2
3
4
next ›
last »