Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Australia
biblio
On measures of information theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 3:40pm
information theory
Shannon perfect secrecy
information theoretic cryptosystem
ideal secrecy
information theoretic security
Vectors
Australia
probability
computational security
Scalability
Entropy
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Do You Trust Me, Blindly? Factors Influencing Trust Towards a Robot Recommender System
Submitted by grigby1 on Tue, 12/01/2020 - 12:33pm
pubcrawl
user engagement
user decision making
user acceptance
Trusted Computing
trust
Technological innovation
robust trust
Robot Trust
robot recommender system
restaurant recommender system
Resiliency
resilience
recommender systems
Australia
preference elicitation
perceived source credibility
nonoptimal choice
mobile robots
increases user trust
human-robot interaction
human users collaborate
Human Factors
Human behavior
ecological validity
Decision Making
collaboration
biblio
The Impact of Time Pressure on Human Cybersecurity Behavior: An Integrative Framework
Submitted by aekwall on Mon, 10/12/2020 - 10:42am
Australia
Human Behavior and Cybersecurity
time pressure
thematic analysis
semi-structured interviews
integrative framework
insecure HCS behavior
human cybersecurity behavior
cybersecurity incidents
cybersecurity experts
cybersecurity contexts
security of data
Human Factors
Stakeholders
computer security
Interviews
Bibliographies
Cybersecurity
pubcrawl
Human behavior
Task Analysis
biblio
Vulnerability Modelling for Hybrid IT Systems
Submitted by grigby1 on Tue, 10/06/2020 - 12:50pm
security
IoT systems
Measurement
Metrics
national vulnerability database
network topology
pubcrawl
realistic IT supply chain system
Safety
IoT embedded networks
Security Metrics
Supply Chain
Topology
traditional computer systems
traditional IT security models
Vulnerability
Vulnerability Evaluation
vulnerability modelling
CVSS v3 framework
attack paths
Australia
Common Vulnerability Scoring System
Complexity theory
computer network security
Computing Theory
critical nodes
CVSS
actual vulnerabilities
CVSSIoT
embedded systems
improved vulnerability scoring system
industry standard
Internet of Things
IoT
IoT devices
biblio
An Ontology-Driven Approach to Automating the Process of Integrating Security Software Systems
Submitted by aekwall on Mon, 08/24/2020 - 11:40am
security orchestration platform
ontology-driven approach
open systems
Organizations
pubcrawl
Resiliency
SecOrP
security of data
security orchestration
Ontology
security software systems
security system
security systems integration processes
Semantics
Snort
Splunk
Task Analysis
DDoS Attack
Human behavior
Expert Systems and Security
Australia
automated integration process
Automated Response Actions
composability
Computer crime
cybersecurity attacks
Scalability
distributed denial of service attacks
incident response process
interoperability
Limacharlie
OnSOAP
Ontologies
ontologies (artificial intelligence)
biblio
HSDC–Net: Secure Anonymous Messaging in Online Social Networks
Submitted by grigby1 on Thu, 08/13/2020 - 4:21pm
Scalability
messaging application providers
online social networks
practical protocol
privacy
protocol design
Protocols
pubcrawl
resilience
Resiliency
message senders
SDC-net
secure anonymous messaging
security issues
Servers
short stability issue
social networking (online)
strongest anonymity guarantees
trust ISP
DC–net
anonymous communications
anonymous messaging
Australia
blockchain users
computer network security
Cryptographic Protocols
Cryptography
data privacy
DC-net suffers
anonymization
dining cryptographers network protocol
disruption management
disruption management subprotocols
hiding contents
HSDC-net achieves low latencies
HSDC-net protocol
internet
message publishing
biblio
Limitations and Approaches in Access Control and Identity Management for Constrained IoT Resources
Submitted by grigby1 on Tue, 01/21/2020 - 10:35am
Access Control
Australia
authentication
authorisation
constrained IoT resources
Human behavior
Identity management
Internet of Things
Medical services
mobile wearable devices
Protocols
pubcrawl
resilience
Scalability
smart sensors
biblio
Network Theory Based Power Grid Criticality Assessment
Submitted by grigby1 on Tue, 11/19/2019 - 2:42pm
network theory
vulnerability assessment
Transmission line measurements
standard IEEE test cases
Resiliency
resilience
pubcrawl
power transmission lines
power grids
power grid vulnerability analysis
power grid vulnerability
power grid criticality assessment
power grid control center
power grid connectivity monitoring
network theory (graphs)
Australia
network flow problem
network flow
Metrics
maximum flow problem
linear programming problem
linear programming duality
Linear programming
Generators
flow network
energy management systems
Energy Management System
critical transmission lines identification
composability
blackout
biblio
Privacy-Preserving Aggregation of Smart Metering via Transformation and Encryption
Submitted by grigby1 on Wed, 02/21/2018 - 12:53pm
Scalability
Human behavior
Human Factors
power engineering computing
privacy
Privacy-preserving
privacy-preserving smart metering system
pubcrawl
resilience
Resiliency
Gaussian processes
Smart Grid Privacy
Smart Metering
smart meters
smart power grids
Transformation
wavelet perturbation algorithm
wavelet transformation
wavelet transforms
WPA
distributed processing
Aggregates
Australia
Cryptography
data aggregation
data privacy
DDP
differential privacy techniques
Distributed databases
distributed differential privacy
aggregate data queries
distributed smart meter data aggregation
ElGamal encryption mechanism
encryption
Fourier perturbation algorithm
Fourier transformation
Fourier transforms
FPA
Gaussian principles
biblio
Analysis of Identity and Access Management alternatives for a multinational information-sharing environment
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
Linear programming
US Department of Defense
technological solutions
technical factor
systems engineering
Scalability
Resiliency
Reliability
pubcrawl
political factors
operational factor
National security
multinational information sharing environment
military computing
military communication
access management alternative
Joint Information Environment
Identity management
identity and access management technologies
Identity and Access Management
identity analysis alternative
Human behavior
Governance protocols
Economics
economic factor
Cybersecurity
computer security
authorization
authorisation
Australia
1
2
next ›
last »