Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Policy Based Governance
biblio
CAG: Compliance Adherence and Governance in Software Delivery Using Blockchain
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
SDLC
License verification
Licenses
litigations
metadata
noncomplaint license software
nonconformant behavior
open source components
open-source software components
Policy Based Governance
pubcrawl
public domain software
Libraries
security risks
smart contracts
Software
software delivery
software development life cycle
software development management
software engineering
standard compliances
technical challenges
vulnerability assessment
decentralized CAG
blockchain
blockchain technologies
building software
client industry
collaboration
compliance adherence and governance
compliance specifications
contracts
copyright issues
Crowd Sourcing
cryptocurrencies
auditing
development activities
disparate sources
distributed teams
economic challenges
extraordinary amounts
functional specifications
geographically distributed teams
Global Software Development
legislation
level agreements
biblio
Need of Private and Public Sector Information Security
Submitted by grigby1 on Fri, 04/03/2020 - 12:03pm
private buildings
Intel
Intelligent systems
Internet of Things
knowledge based systems
man in middle
Organizations
personnel security
Policy Based Governance
Portable computers
information technicians
private sector information security
pubcrawl
public sector information security
sensitive information
sentinel systems
smart information security Intel processes
Standards organizations
virtual data tables
Data protection
Airports
AS-IS office system
authorisation
biometric
biometrics (access control)
Buildings
collaboration
conveyor belts
data entry-exit log
airport like security with digital boxes
digital bar-coded air port
digital bar-coded conveyor boxes
evaes-dropping
government buildings
government data processing
government offices
information security
information stealing
biblio
Securing Big Data in the Age of AI
Submitted by grigby1 on Fri, 04/03/2020 - 12:03pm
data privacy
security
relational database security
pubcrawl
privacy
Policy Based Governance
NoSQL databases
Metrics
machine learning
Human behavior
Data Security
Intelligent Data and Security
Data models
composability
collaboration
Big Data
Artificial Intelligence
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
EL-SEC: ELastic Management of Security Applications on Virtualized Infrastructure
Submitted by grigby1 on Thu, 12/05/2019 - 10:53am
SDN
PID controllers
Policy
Policy Based Governance
policy governance
proportional integral derivative controllers
pubcrawl
Recursive InterNetwork Architecture
resilience
Resiliency
RINA
PI controllers
Snort intrusion detection system
software defined networking
three-term control
virtual machines
virtualisation
virtualized infrastructure
virtualized network functions
virtualized security NFs
VNF Snort instances
GENI testbed
autonomic VNF instances scaling
clean slate
Cloud Computing
cloud infrastructure
collaboration
computer network security
Control Theory
EL-SEC framework
elastic management of security applications
Elastic Manager
Attack Analyzer
Human behavior
Human Factors
internetworking
Intrusion Detection
Load management
Metrics
Monitoring
Noise measurement
PI control
biblio
Securing Named Data Networks: Challenges and the Way Forward
Submitted by grigby1 on Thu, 12/05/2019 - 10:53am
named data networks
security
Resiliency
resilience
pubcrawl
privacy
policy governance
Policy Based Governance
Policy
Access Control
Metrics
integrity
Human Factors
Human behavior
edge computing
confidentiality
collaboration
clean slate
biblio
A Survey of End-System Optimizations for High-Speed Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:53am
Metrics
Resiliency
resilience
rate-based protocol
queueing model
pubcrawl
policy governance
Policy Based Governance
Policy
clean slate
Human Factors
Human behavior
high-speed networks
flow control
experimental analysis
end-system bottleneck
collaboration
biblio
VerifiedFT: A Verified, High-Performance Precise Dynamic Race Detector
Submitted by grigby1 on Thu, 12/05/2019 - 10:52am
clean slate
collaboration
Concurrency
Data Races
dynamic analysis
Human behavior
Human Factors
Metrics
Policy
Policy Based Governance
policy governance
pubcrawl
resilience
Resiliency
biblio
Software Defined Infrastructure: Rethinking Cybersecurity with a More Capable Toolset
Submitted by grigby1 on Thu, 12/05/2019 - 10:52am
policy governance
Virtualization
software defined infrastructure
software defined
security
SDI
Resiliency
resilience
pubcrawl
clean slate
Policy Based Governance
Policy
Metrics
Human Factors
Human behavior
Cybersecurity
collaboration
biblio
AnyDSL: A Partial Evaluation Framework for Programming High-Performance Libraries
Submitted by grigby1 on Thu, 12/05/2019 - 10:52am
parallelization
vectorization
Resiliency
resilience
pubcrawl
policy governance
Policy Based Governance
Policy
partial evaluation
clean slate
Metrics
library design
Human Factors
Human behavior
high-performance
gpu computing
collaboration
biblio
Implementation of a C-UNB Module for NS-3 and Validation for DLMS-COSEM Application Layer Protocol
Submitted by grigby1 on Thu, 12/05/2019 - 10:52am
random access
Metrics
network simulation module
ns-3
Physical layer
Policy
Policy Based Governance
policy governance
power meters
probability of successful transmission
Protocols
pubcrawl
medium access control layer
remote site
resilience
Resiliency
Servers
smart meters
smart power grids
ultra narrow band
urban area
wide area networks
Zigbee
Device Language Message Specification-Companion Specification
Adaptation models
advanced metering infrastructure
asynchronous bandwidth devices
bandwidth channels
Base stations
C-UNB wireless networks
cellular radio
clean slate
clean-slate cellular network technology
collaboration
access protocols
DLMS-COSEM application layer protocol
embedded devices
Human behavior
Human Factors
Internet of Things (IoT)
lightweight random access protocol
low-bandwidth devices
low-power wide area wireless network technologies
machine-to-machine (M2M)
Mathematical model
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »