Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
collaboration
biblio
A Security Analysis Method for Supercomputing Users \#x2019; Behavior
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
Protocols
Virtual private networks
supercomputing user behavior
supercomputing business process
Supercomputers
supercomputer
Security Policies Analysis
security of data
security level optimization
security level improvement
security incident detection
security analysis method
security
resource use tracking
pubcrawl
audit policy
policy-based governance
operation records
operating systems
mass storage
mainframes
log analysis
Linux
Human Factors
Correlation analysis
Correlation
complete user behavior path restoration
collaboration
business data processing
biblio
A model for the analysis of security policies in service function chains
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
pubcrawl
virtualisation
Virtual private networks
software tools
software defined networking
Software
SFC
service function chains
Security Policies Analysis
security policies
SDN
Ad hoc networks
program verification
policy-based governance
NFV
network function virtualization
Monitoring
formal model
Cryptography
computer network security
collaboration
Analytical models
biblio
Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR Systems
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
health care
XACML policies
XACML
similarity analysis
Security Policies Analysis
security
secure privacy-preserved EHR systems
secure integrated systems
pubcrawl
privacy
policy-based governance
patients privacy
large scale healthcare system
hospitals
Access Control
electronic healthcare systems
electronic health records
electronic health record
distributed systems
distributed processing
Data Security
data privacy
Cryptography
computer network
collaboration
authorisation
access control policy combination
biblio
Requirement analysis and descriptive specification for exploratory evaluation of information system security protection capability
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
information system security protection capability
uncertainty
specification description
Security Policies Analysis
security of data
security
requirement analysis
pubcrawl
protective equipment
protection policy
policy-based governance
Information systems
information system structure model
Analytical models
Granular Computing theory
granular computing
Formal Specification
exploratory evaluation requirements
exploratory evaluation process
exploratory evaluation description problem
exploratory evaluation
descriptive specification
description specification
Computational modeling
collaboration
Business
biblio
A Graphical Password Authentication for analyzing legitimate user in online social network and secure social image repository with metadata
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
meta data
uploaded images
social networking (online)
Social network services
Security Policies Analysis
secure social image repository
pubcrawl
privacy
policy-based governance
online social network
multimedia information sharing
metadata
Meta Data Stratification
alphanumeric textbased password
legitimate user
internet
hassle-free privacy setting
Graphical Password authentication
flaw points
Databases
data privacy
Computer hacking
collaboration
automatic policy prediction
authorisation
authentication
biblio
SDN data path confidence analysis
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
Software-Defined Networks
Routing
SDN data path confidence analysis
SDN hybrid networks
secure network
Security Metrics
Security Policies Analysis
sensitive data
sensitive information
single metric indicator
software defined networking
Software-defined networking (SDN)
remediation costs
specific network path
Springs
stolen information
systemic network problems
time series
Time series analysis
time series data repository
tools
Traceroute
unauthorized access
latent network problems
autonomous systems
collaboration
competitors costs industry
Confidence Assessment
confidence score
configuration metrics
dependable network
domestic policy
foreign policy
internet
automated system protection services
Measurement
multifactor indicator analysis
network behavior
network configuration
network operation
network path confidence analysis service
OpenFlow
policy-based governance
proprietary information
pubcrawl
biblio
Integrating visual analysis of network security and management of detection system configurations
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
collaboration
Communication networks
Configuration Management
Data models
Databases
Intrusion Detection
Intrusion Detection Systems
Monitoring
network security
policy evaluation
policy-based governance
pubcrawl
Security Policies Analysis
Security Visualization
visualization
biblio
Context-aware graph-based analysis for detecting anomalous activities
Submitted by grigby1 on Tue, 12/12/2017 - 1:24pm
pubcrawl
Insider Threats
maximum flow algorithm
Metrics
multimodal resources
optimisation
optimization
Organizations
policy-based governance
insider threat
query-adaptive graph-based optimization approach
Reliability
Resiliency
Support vector machines
time-dependent data
ubiquitous computing
user model mutual similarity
user profile analysis
context-dependent anomaly type
anomalous activity detection
anomalous user activity identification
Anomaly Detection
anomaly localization
anomaly occurrence
collaboration
Complexity theory
context-aware graph-based analysis
Activity Recognition
data analysis
Electronic mail
exhaustive identification
gesture recognition
graph analysis
graph theory
Human behavior
Human Factors
biblio
Scenarios using situation awareness in a simulation environment for eliciting insider threat behavior
Submitted by grigby1 on Tue, 12/12/2017 - 1:24pm
Insider Threats
usability
Stress
Situation Awareness
simulation environment
simulation
security of data
Resiliency
pubcrawl
policy-based governance
Particle measurements
Metrics
IT behavior
active indicators
insider threat behavior
insider threat
Human Factors
Human behavior
Government
gaze tracking
Decision support systems
deception
Cybersecurity
collaboration
Atmospheric measurements
AI
biblio
Insider Threats and Cryptographic Techniques in Secure Information Management
Submitted by grigby1 on Tue, 12/12/2017 - 1:24pm
Human behavior
unauthorized leakage
strategic data splitting
semantic analysis
secure information management
Resiliency
pubcrawl
Protocols
policy-based governance
Metrics
Insider Threats
information management security
information management
Human Factors
authorisation
enterprise management processes
Economics
data reconstruction methods
Data protection
data analysis
Cryptography
Cryptographic Protocols
cryptographic data splitting algorithms
Companies
collaboration
cognitive systems
cognitive data analysis
business data processing
« first
‹ previous
…
86
87
88
89
90
91
92
93
94
…
next ›
last »