Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
taxonomy
biblio
Gang of Eight: A Defect Taxonomy for Infrastructure as Code Scripts
Submitted by Laurie Williams on Thu, 10/08/2020 - 12:10pm
bug
category
configuration as code
configuration scripts
defect
DevOps
infrastructure as code
puppet
software quality
taxonomy
biblio
Taxonomy Analysis of Security Aspects in Cyber Physical Systems Applications
Submitted by aekwall on Mon, 09/28/2020 - 11:10am
distributive nature
autonomous systems
CPS
security aspects
sensitive data
Intelligent systems
control methods
critical applications
cyber physical system applications
security issues
eHealth
innovative technologies
IoT related issues
taxonomy analysis
taxonomy based analysis
vehicular technologies
CPS Privacy
privacy
computer network security
Monitoring
data privacy
privacy concerns
Internet of Things
security
Human behavior
pubcrawl
security of data
cyber physical systems
Smart Grid
Smart Grids
sensors
Human Factors
industrial control
taxonomy
biblio
Composing system integrity using I/O automata
Submitted by grigby1 on Fri, 09/04/2020 - 2:15pm
closure properties
BIOS Security
vending machine
valid states
transition control
taxonomy
system integrity
invalid starts
invalid initial states
integrity definitions
input output automata
I/O automata
externally-controlled transitions
customer environment
computer viruses
security
Automatic control
automata theory
automata
system design
Safety
Human Factors
resilience
Resiliency
Metrics
pubcrawl
data integrity
Scalability
control systems
security of data
biblio
Taxonomy Analysis of Cloud Computing Vulnerabilities through Attack Vector, CVSS and Complexity Parameter
Submitted by grigby1 on Fri, 08/28/2020 - 11:02am
CVSS
unified taxonomy
taxonomy
security vulnerabilities
security risks
security of data
Scalability
Resiliency
resilience
pubcrawl
NVD
Human behavior
CVSS score
attack vector
comprehensive taxonomy
complexity parameter
cloud vulnerabilities
cloud specific vulnerabilities
cloud specific identified vulnerabilities
cloud enabled services
cloud computing vulnerabilities
cloud computing system
Cloud Computing
Attack vectors
Attack Vector (AV)
biblio
Invited Paper: The Applications of Machine Learning in Privacy Notice and Choice
Submitted by grigby1 on Fri, 04/03/2020 - 11:34am
Privacy Policies
World Wide Web
user interactions
taxonomy
privacy stakeholders
privacy notice
privacy landscape
privacy awareness
online privacy practices
General Data Protection Regulation
privacy
Companies
Scalability
data privacy
Human behavior
pubcrawl
machine learning
Data collection
learning (artificial intelligence)
biblio
Computational Stylometry and Machine Learning for Gender and Age Detection in Cyberbullying Texts
Submitted by grigby1 on Mon, 01/27/2020 - 11:29am
Age Detection
Computational Stylometry
Cyberbullying Detection
feature extraction
Gender Detection
Human behavior
Human Factors
Linguistics
machine learning
Metrics
psychology
pubcrawl
Semantics
Social network services
stylometry
taxonomy
biblio
Prevention and Mitigation of DNS Based DDoS Attacks in SDN Environment
Submitted by grigby1 on Wed, 12/18/2019 - 1:45pm
IP networks
telecommunication traffic
taxonomy
Software Defined Networks
software defined networking
Servers
SDN environment
SDN
Resiliency
resilience
pubcrawl
Protocols
Metrics
IP spoofing
attack packets
internet
Human behavior
domain name system protocol
DNS protocol
DNS
distributed denial-of-service attack
DDoS Attack Prevention
DDoS Attack
DDoS
computer network security
Computer crime
composability
biblio
Security Metrics: Principles and Security Assessment Methods
Submitted by aekwall on Mon, 07/01/2019 - 9:11am
security assessment
Taxonomy of Security Metric
taxonomy
Standards organizations
security standards
security sections
security of data
Security Metrics
security metric
security measures
security conditions
security assessments
security assessment methods
Measurement
pubcrawl
Organizations
organizational security
Metrics
metric standards
Meta-Metric
information technology
information security
business data processing
benchmarking method
Benchmark testing
metrics testing
biblio
Cyber Kill Chain based Threat Taxonomy and its Application on Cyber Common Operational Picture
Submitted by grigby1 on Mon, 01/21/2019 - 11:37am
malware
Weapons
visualization
threat taxonomy
taxonomy
security of data
Scalability
Resiliency
Reconnaissance
pubcrawl
persistent forms
organizations cyber assets
Metrics
advanced persistent threat attacks
intelligent forms
Human behavior
cyber situation awareness
cyber kill chain based threat taxonomy
Cyber Kill Chain
cyber common operational picture
command and control systems
Chained Attacks
attack tactics
Analytical models
adversarial behavior
advanced persistent threats
biblio
Towards Collaborative Trust Management
Submitted by grigby1 on Thu, 08/23/2018 - 10:46am
Peer-to-peer computing
Trusted Computing
trust profiles
trust management operations
Trust management
trust
taxonomy
Software Architecture
reference architecture
reconfigurable trust management operations
quality of service
pubcrawl
Personalized Trust
Cloud Computing
Human Factors
Human behavior
hardcoded trust computations
groupware
customizable trust management operations
contemporary trust management solutions
computer theory
computer architecture
Complexity theory
Collaborative Trust Computing
collaborative personalized trust management system
collaboration
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »