Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pubcrawl170112
biblio
Current efforts in ports and supply chains risk assessment
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
pubcrawl170112
supply chains
supply chain risk assessment
supply chain partners
Supply Chain
standards
security of data
security
sea ports
risk management
risk assessment
CII
Ports (Computers)
port service risk assessment
physical /cyber security
maritime supply chain processes
Marine vehicles
marine engineering
goods dispatch data processing
critical infrastructures
critical information infrastructures
complex interrelated ICT systems
biblio
Hardware Design and Verification Techniques for Supply Chain Risk Mitigation
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
integrated circuit design
Watermarking
supply chains
supply chain security risks mitigation
supply chain management
pubcrawl170112
overbuilding
metering
integrated circuits
concurrent checking
IC obfuscation
IC misusing
Hardware
Foundries
Fingerprinting
design automation
counterfeiting
concurrent engineering
biblio
On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
protocol-based clustering tag
telecommunication security
supply-chain management systems
supply chain management
Servers
Security analysis
security
RFID systems
RFID
radiofrequency identification
radio frequency identification
pubcrawl170112
Protocols
authentication
privacy
mathematical analysis
Intelligent systems
industrial environment
Indexes
healthcare monitoring and
delays
delay analysis
cryptography protocol
Cryptographic Protocols
cryptographic protocol
biblio
System security engineering vulnerability assessments for mission-critical systems and functions
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
supply chains
vulnerability identification
vulnerability assessment
US Department of Defense
testing
Systems engineering and theory
systems engineering
system security engineering vulnerability assessments
system security engineering
system security
system maturity points
Databases
Software
security of data
security
pubcrawl170112
mission-critical systems
mission-critical functions
military computing
DoD
Department of Defense
defense systems
biblio
Designing a database encryption technique for database security solution with cache
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
Elliptic curves
database management software
database management systems
database security solution
Databases
DBMS
Decision Making
Elliptic curve cryptography
Elliptic Curve Cryptography(ECC)
database encryption technique
elliptical curve cryptography module
encryption
financial information
personal files
pubcrawl170112
public key cryptography
RSA
supply chain management
Data collection
cache storage
client details
company secrets
computer architecture
corporate data
corrupted data
customer service management
data availability
Advanced Encryption Standard(AES)
data consistency
data integrity
data loss
data management
data organization
data quality
data retrieval
database cache
biblio
A new X-ray backscatter technology for aviation security applications
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
suspicious object detection
non-intrusive imaging
object detection
one-sided access method
packet parcel
pubcrawl170112
security applications
sensor arrays
supply chain security
National security
threat detection accuracy
twisted-slit collimator
X-ray backscatter camera
X-ray backscatter image enhancement
X-ray backscatter imaging
X-ray backscatter technology
X-ray detection
X-ray imaging
digital radiography
Airports
aviation security applications
avionics
backscatter
Cameras
collimators
detection of dangerous materials
Detectors
air safety
explosive detection
explosive simulants
high-resolution digital detector arrays
Inspection
luggage
luggage inspection
mock-up dangerous materials
biblio
A proven method for identifying security gaps in international postal and transportation critical infrastructure
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
supply chain management
resilince management
risk analysis
security
security gap identification
security risk mitigation
shipping processing facilities
ships
Standards organizations
pubcrawl170112
surface to-air missile system
Transportation
transportation critical infrastructure security
transportation processing facilities
United States Postal Inspection Service
UPU standards
USPIS
worldwide commerce
international scale
critical transportation services
field instrument
global supply chain
Inspection
Instruments
international community
international mail processing centers
international postal infrastructure
critical infrastructures
military aircraft
missiles
National security
Organizations
physical security
physical security assessment method
Postal services
biblio
Redesigning QR Code Ecosystem with Improved Mobile Security
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
mobile marketing
Software
security threat
security risks
risk analysis
redesigned QR code ecosystem
QR codes
QR code
public key infrastructure
Public key
pubcrawl170112
Mobile Security
advertising
mobile computing
life cycle
information system
Ecosystems
Ecosystem
digital signatures
digital signature mechanism
digital signature
Decoding
authentication
advertising campaigns
biblio
Security on RFID technology
Submitted by grigby1 on Wed, 03/08/2017 - 2:23pm
building access
computing technologies
counterfeiting
Noise measurement
pubcrawl170112
radio frequency identification
radiofrequency identification
RFID
RFID data security
RFID systems
RFID technology
security of data
Security on RFID
supply chains
telecommunication computing
tracking livestock
biblio
Analyzing information security investment in networked supply chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:23pm
networked supply chains
Trusted Computing
trust risks
supply chains
supply chain management
socially optimal solutions
security breaches
security attacks
risk management
pubcrawl170112
organisational aspects
optimisation
optimal strategy
noncooperative game condition
Computer hacking
Investment
interdependent risks
information security risk
information security investment
information security
infectious risks
Games
game theory-based model
game theory
firms
equilibrium levels
Economics
« first
‹ previous
1
2
3
4
5
6
next ›
last »