Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Standards organizations
biblio
The Software Application for Increasing the Awareness of Industrial Enterprise Workers on Information Security of Significant Objects of Critical Information Infrastructure
Submitted by grigby1 on Thu, 09/16/2021 - 3:08pm
resilience
Training
tools
Standards organizations
software application
security
Scientific Computing Security
Safety
Resiliency
Awareness
pubcrawl
Organizations
Metrics
information security
employee
digital industry
critical information infrastructure
Compositionality
biblio
Secure Wipe Out in BYOD Environment
Submitted by aekwall on Mon, 01/11/2021 - 12:30pm
Scalability
encryption
Hardware
performance evaluation
real-time systems
pubcrawl
tools
privacy
Standards organizations
computer science
BYOD
cryptographic erasure
deletion
Memory Forensics
Per-file deletion
data deletion
biblio
Analysis of key Factors for Organization Information Security
Submitted by grigby1 on Fri, 11/20/2020 - 1:26pm
Organizations
User training
User awareness
Training
Standards organizations
Security Policies Analysis
security of data
security culture
pubcrawl
policy-based governance
outsider attack
Data protection
organization information security
organisational aspects
insiders misuse
information security system
information security structure
Information Security Culture
information security
information protection
Human Factors
biblio
Issues and Trends in Information Security Policy Compliance
Submitted by grigby1 on Fri, 11/20/2020 - 1:26pm
ISP
threats
Standards organizations
Security Policies Analysis
security of data
security behaviour
pubcrawl
policy-based governance
Personnel
Organizations
organizational information security policies
Compliance
information security policy compliance
information security policy
information security management
information security incidents
information security
information leakage threats
information governance
information and communication technology
Industry 4.0
computer security
biblio
The correlation between intellectual property management and quality management in the modern knowledge-based economy
Submitted by grigby1 on Thu, 07/30/2020 - 1:05pm
Technological innovation
quality policy
quality policies
quality management
organization
Management
knowledge-based economy
knowledge based systems
knowledge based economy
intellectual property policies
intellectual property management
industrial knowledge-based organization
Economics
design activities
ip protection
Organizations
Metrics
knowledge management
Law
composability
Standards organizations
intellectual property
industrial property
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
organisational aspects
biblio
Automated Security Configuration Checklist for Apple iOS Devices Using SCAP v1.2
Submitted by aekwall on Mon, 07/27/2020 - 11:20am
patch management
Vulnerability
tools
Standards organizations
security-related configuration settings
security of data
security content automation protocol
security configurations monitoring
security baseline
security automation
SCAP
Resiliency
pubcrawl
policy compliance
Apple iOS
Organizations
organization
Monitoring
Metrics
iOS Security
iOS (operating system)
information security management tasks
Human Factors
Compositionality
Compliance
automation
automated security configuration checklist
Apple iOS device configuration
biblio
An anomaly detection approach for enterprise file integration
Submitted by aekwall on Mon, 05/11/2020 - 10:29am
file transfer processes
corporate systems
effective self-learning anomaly detection module
emergency services
enterprise file integration
enterprise systems
file integration
file malfunction
file size
file structure
alarm system
file transfers
integration channels
integration duration
novel anomaly detection approach
organization work process management
real-time file integrations
transfer logs
transferring files
Anomaly Detection
Organizations
data integrity
information security
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
Metrics
security of data
Intrusion Detection
Standards organizations
middleware
security issues
information system
emergency management
accountability
network accountability
biblio
Information Systems and Network Technologies for Personal Data Cyber Security in Public Health
Submitted by aekwall on Mon, 05/04/2020 - 10:22am
Organizations
Standards organizations
security of data
Resiliency
public healthcare
public health sector
public health enterprises
public health
pubcrawl
Predictive Metrics
personal data cyber security systems
personal data cyber security legislation
personal data
composability
Networked Control Systems Security
network technologies
medical information systems
legislation
Insurance
Information systems
information system
information management
health information management systems
health care
cyber security
computer security
biblio
The Method of Assessing the Level of Compliance of Divisions of the Complex Network for the Corporate Information Security Policy Indicators
Submitted by grigby1 on Fri, 04/03/2020 - 11:04am
Information systems
the ratio of Pareto
the Hamming distance
the accounts of the Board
Standards organizations
security of data
risk minimization
risk management
ranking of the values of indicators
pubcrawl
policy-based governance
Policy Based Governance
Organizations
maximin and minimax procedures
collaboration
Information services
information security
Games
decision-making
Decision Making
criteria
corporate information system
corporate information security policy requirements
corporate information security policy indicators
compliance level assessment
complex networks
complex network
comparative assessment
biblio
Need of Private and Public Sector Information Security
Submitted by grigby1 on Fri, 04/03/2020 - 11:03am
private buildings
Intel
Intelligent systems
Internet of Things
knowledge based systems
man in middle
Organizations
personnel security
Policy Based Governance
Portable computers
information technicians
private sector information security
pubcrawl
public sector information security
sensitive information
sentinel systems
smart information security Intel processes
Standards organizations
virtual data tables
Data protection
Airports
AS-IS office system
authorisation
biometric
biometrics (access control)
Buildings
collaboration
conveyor belts
data entry-exit log
airport like security with digital boxes
digital bar-coded air port
digital bar-coded conveyor boxes
evaes-dropping
government buildings
government data processing
government offices
information security
information stealing
« first
‹ previous
1
2
3
4
5
next ›
last »