Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Task Analysis
biblio
Web Service Selection with Correlations: A Feature-Based Abstraction Refinement Approach
Submitted by aekwall on Mon, 11/30/2020 - 12:03pm
Scalability
Internet-scale Computing Security
workflow
Web service selection problem
Web service benchmarks
Silicon compounds
service selection
ordered tasks
linear workflow
feature-based abstraction refinement technique
candidate services
policy governance
set theory
Task Analysis
Proposals
Correlation
optimisation
web services
optimization
Metrics
composability
pubcrawl
Human behavior
Resiliency
Feature Selection
biblio
Heterogeneity Aware Workload Management in Distributed Sustainable Datacenters
Submitted by aekwall on Mon, 11/30/2020 - 12:02pm
holistic heterogeneity-aware cloud workload management approach
dynamic power availability
flexible batch job management approach
flexible batch job manager
green computing
green energy
green power availability
green power supply
Green products
heterogeneity
heterogeneity aware workload management
heterogeneity-oblivious approach
heterogeneous workloads
distributed sustainable datacenters
Internet service operators
Internet-scale services
job migration
large-scale data analytics
real-world weather conditions
sCloud
Sustainable datacenter
system goodput
transactional workload placement
workload placement
workload traces
Internet-scale Computing Security
computer centres
Task Analysis
power aware computing
Resiliency
Human behavior
pubcrawl
composability
Metrics
optimization
sustainable development
quality of service
constrained optimization problem
scheduling
Cloud Computing
QoS requirements
nonlinear programming
Power supplies
System performance
policy governance
batch job migration algorithm
brown energy
clouds
datacenter power consumption
distributed datacenters
distributed self-sustainable datacenters
biblio
Network Security Risk Assessment Using Intelligent Agents
Submitted by aekwall on Mon, 11/23/2020 - 11:22am
network connectivity
Data Security
attack graphs
automated intelligent systems
decision-making approach
FCMs
Fuzzy cognitive maps
governmental rules
interconnected network analysis
large networks analysis
attack graph
network graphical representation
network security engineers
network security risk assessment
organisational rules
Risk Prevention
security risk analysis
Intelligent Data Security
Intelligent Data and Security
Decision Making
Scalability
security
Task Analysis
Resiliency
pubcrawl
graph theory
multi-agent systems
tools
computer network security
robots
Communication networks
security breaches
risk analysis
computer networks
Compositionality
multiagent system
data communication
biblio
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes
Submitted by grigby1 on Fri, 11/20/2020 - 2:26pm
post-breach security
zero risk appetite
Task Analysis
security theatre
Security Policies Analysis
security policies
security of data
security division
security culture
security controls
security breach
security behaviour
pubcrawl
Productivity
post-breach security changes
Companies
policy-based governance
Personnel
participatory action research
organization security division
organisational aspects
Investment
Interviews
humble inquiry
financial investment
financial data processing
employees
Data Breach
data analysis
biblio
Security Requirements for Cloud-based C4I Security Architecture
Submitted by grigby1 on Fri, 11/20/2020 - 2:25pm
national innovation
US military
Task Analysis
Servers
security vulnerabilities
security requirements
Security Policies Analysis
security of data
secure security architecture
public sector
pubcrawl
policy-based governance
Cloud Computing
national defense command control system
military computing
Korea national defense information system
Korea Military
Information systems
computer security
command and control systems
Cloud-based C4I Security Requirements
cloud-based C4I security architecture
cloud computing technology
cloud computing system
biblio
Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organization
Submitted by grigby1 on Fri, 11/20/2020 - 2:15pm
Mathematical model
variable perceived value congruence
Task Analysis
self-determination theory
Security policy compliant behaviour
Security Policies Analysis
security performance
security of data
Saudi Arabia
relatedness
pubcrawl
policy-based governance
Personnel
perceived value congruence
perceived legitimacy
organisational aspects
autonomy
ISP compliance intentions
intrinsic motivation
information security policy compliance
information security policy
information security
Human Factors
Fortune 600 organization
employees motivation
Electronic mail
Data models
computer security
competence
collaboration
behavioral research
biblio
Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services
Submitted by grigby1 on Fri, 11/20/2020 - 2:14pm
Policy
managed security service
managed security service provider
Managed security services
Monitoring
MSS platform customers
MSSP
multi-tenant
organization
outsourcing
Peer-to-peer computing
platform solution
large-scale enterprises
policy-based governance
Portals
privacy
privacy concerns
private sectors
pubcrawl
public sectors
security of data
Security Policies Analysis
Task Analysis
use case
data anonymization
business data processing
cloud service
collaboration
collaborative data sharing
component
computer security
confidential data sharing
cyber security
cyber security data sharing
cyber security information
cybercrimes
architecture
data encryption
data privacy
Data Sanitization
data sharing
design
diagram
flexible data sharing
information
Lakes
large-scale enterprise
biblio
Machine Learning Based Physical-Layer Intrusion Detection and Location for the Smart Grid
Submitted by grigby1 on Fri, 11/20/2020 - 2:05pm
security of data
Power cables
power engineering computing
power system security
privacy
pubcrawl
radio networks
resilience
Resiliency
Scalability
policy-based governance
smart grid communication data
smart grid consumer privacy
smart grid data security
Smart Grids
smart power grids
stand-alone solution
Task Analysis
upper layer techniques
Intrusion Detection
carrier transmission on power lines
collaboration
communication purposes
composability
continuous bidirectional information exchange
cryptographic techniques
Human behavior
ideal intruder detection rates
Impedance
active intruder
learning (artificial intelligence)
machine learning
Metrics
modems
network stack
PHY design
physical layer methods
physical-layer intrusion detection
biblio
Multi-Domain Effects and the Internet of Battlefield Things
Submitted by grigby1 on Tue, 11/17/2020 - 2:51pm
MDO effect loop decision process
Weapons
Task Analysis
sensors
Scalability
Radar
pubcrawl
multidomain operating environment
multidomain effects
Multi-Domain Operations (MDO)
military effects
military computing
Artificial Intelligence
IoBT effects
iobt
Internet of Things (IoT)
Internet of Things
Internet of battlefield things
Human Factors
effects
decision-making
Decision Making
decision frameworks
contemporary military decision-processes
biblio
Security for Resilient IoBT Systems: Emerging Research Directions
Submitted by grigby1 on Tue, 11/17/2020 - 2:50pm
resilience
military operations
military sensing assets
next-generation artificial intelligence
operational conditions
optimization
organisational aspects
Provenance
pubcrawl
military computing
resilient IoBT systems
Scalability
security techniques
sensors
Task Analysis
trust
Trusted Computing
Internet of battlefield things
computer network security
contested battlefield environments
continued advances
Cryptography
Cybersecurity
diverse asset ownership
Human Factors
individual assets
adversary activities
Internet of Battlefield Things paradigm
Internet of Things
iobt
IoT technology
learning (artificial intelligence)
Linear programming
machine learning systems
« first
‹ previous
…
24
25
26
27
28
29
30
31
32
…
next ›
last »