Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
component
biblio
Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services
Submitted by grigby1 on Fri, 11/20/2020 - 2:14pm
Policy
managed security service
managed security service provider
Managed security services
Monitoring
MSS platform customers
MSSP
multi-tenant
organization
outsourcing
Peer-to-peer computing
platform solution
large-scale enterprises
policy-based governance
Portals
privacy
privacy concerns
private sectors
pubcrawl
public sectors
security of data
Security Policies Analysis
Task Analysis
use case
data anonymization
business data processing
cloud service
collaboration
collaborative data sharing
component
computer security
confidential data sharing
cyber security
cyber security data sharing
cyber security information
cybercrimes
architecture
data encryption
data privacy
Data Sanitization
data sharing
design
diagram
flexible data sharing
information
Lakes
large-scale enterprise
biblio
Security Perceptions in Cloud-Based e-Govemment Services:
Submitted by grigby1 on Fri, 10/16/2020 - 11:13am
Human behavior
security perception
security of data
Resiliency
resilience
pubcrawl
policy-based governance
Perceived security
Jordan
IT-staff perspectives
interpretive-qualitative approach
citizen perspective
government stakeholders
government data processing
e-government initiative
E-Government
Cybersecurity
component
collaboration
cloud-based e-government services
cloud services
Cloud Computing
biblio
An Instrument to Measure Human Behavior Toward Cyber Security Policies
Submitted by aekwall on Mon, 10/12/2020 - 11:42am
Human Factors
security of data
pubcrawl
password
Organizations
Masuerment instrument
Instruments
information technology
Information system policie
information security
behavior pattern
human error
human behavior measurement
Human Behavior and Cybersecurity
Human behavior
Gamification
Electronic mail
cybersecurity policies
Cyber security policies
component
biblio
An Improved Method for Generating Biometric-Cryptographic System from Face Feature
Submitted by grigby1 on Fri, 08/28/2020 - 3:44pm
encryption
feature extraction
pubcrawl
Metrics
Resiliency
Scalability
component
resilience
Face
Biomedical imaging
biometric encryption
Facial features
formatting
insert
style
styling
biblio
Classifying Fake News Articles Using Natural Language Processing to Identify In-Article Attribution as a Supervised Learning Estimator
Submitted by grigby1 on Fri, 08/28/2020 - 12:23pm
news article
information accuracy
key linguistic characteristics
learning (artificial intelligence)
Linguistics
machine learning
mainstream media platforms
Media
Metrics
natural language processing
Influence Mining
pattern classification
pubcrawl
radio news
resultant process precision
social media conduits
social media platforms
social networking (online)
supervised learning estimator
tools
fake news articles
Attribution Classification
Bayes methods
Bayesian machine learning system
classifier performance
component
composability
deceptive content
Decision Making
fake news
attribution
fake news classifier
fake news detector
fake news identification study
fake news stories
feature extraction
Grammar
Human behavior
in-article attribution
biblio
A CP-ABE Scheme Supporting Attribute Revocation and Policy Hiding in Outsourced Environment
Submitted by grigby1 on Fri, 07/24/2020 - 12:49pm
attribute base encryption
collaboration
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
policy hiding
outsourced environment
mobile terminals
mobile end
lightweight decryption
data outsourcing (key words)
CP-ABE scheme
component
attributes revocation
attribute revocation
Ciphers
algorithm analysis
CP-ABE
policy-based governance
pubcrawl
outsourcing
Scalability
Servers
authorisation
Access Control
encryption
Cryptography
biblio
Modeling Cyber Security of Information Systems Smart City Based on the Theory of Games and Markov Processes
Submitted by aekwall on Mon, 07/06/2020 - 10:14am
Markov processes
Cyber Dependencies
town and country planning
smart city systems
likelihood of cyber threats
information systems smart city
information security circuits
cybernetic risk
Cyber Security Systems
Communication Systems
information technologies
Smart City
cyber threats
Compositionality
smart cities
security of data
Human Factors
Games
Information systems
probability
Mathematical model
Computer hacking
Metrics
Computational modeling
component
pubcrawl
Resiliency
cyber security
game theory
Scalability
biblio
Intruder Detection with Alert Using Cloud Based Convolutional Neural Network and Raspberry Pi
Submitted by aekwall on Mon, 06/01/2020 - 10:53am
intruder detection system
Training
security of data
Resiliency
resilience
Raspberry Pi
raspberry p
pubcrawl
policy-based governance
Monitoring
MMS alert
middleware security
middleware
Cameras
intruder detection
image acquisition
feature extraction
Data models
convolutional neural networks
convolutional neural network
convolutional neural nets
composability
component
CNN algorithm
Cloud Computing
cloud based convolutional neural network
biblio
Secure and Scalable Trust Management Model for IoT P2P Network
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
security issues
peer to peer security
P2P network
large-scale trust model
IoT trust management
IoT resources
IoT P2P network
IoT entities
Holochain
fog node approach
distributed trust management model
DHT
centralized models
blockchain-based trust management model
Trust management
security of data
Human Factors
Scalability
IoT security
Reliability
blockchain
Metrics
Peer-to-peer computing
component
pubcrawl
Resiliency
Data models
Trusted Computing
data integrity
Internet of Things
biblio
A Robust Malware Detection System Using Deep Learning on API Calls
Submitted by grigby1 on Fri, 03/27/2020 - 11:37am
cuckoo sandbox
robust malware detection system
redundant API
Object oriented modeling
neural nets
massive malware
massive datasets
malware detection
computer security
component
BLSTM
API sequences
API calls
API
Logic gates
application program interfaces
sandboxing
invasive software
malware
composability
policy-based governance
pubcrawl
Neural networks
feature extraction
collaboration
learning (artificial intelligence)
deep learning
« first
‹ previous
1
2
3
4
5
6
next ›
last »