Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information security
biblio
A Competency Model to Help Selecting the Information Security Method for Platforms of Communication by Visible Light (VLC)
Submitted by grigby1 on Mon, 11/19/2018 - 12:34pm
Metrics
VLC
Visible Light Communications Security
visible light communication
TOPSIS and The Game Theory
security of data
security information
security criteria
security
Scalability
right security problems
Resiliency
resilience
research project
pubcrawl
alternative methods
light emitting diodes
information security method
information security
Informatics
free-space optical communication
Decision Making
Data models
competency model
Communication by Visible Light (VLC)
business context
business communication
Bayesian Nets
Analytical models
biblio
Asymptotic Analysis of a New Low Complexity Encryption Approach for the Internet of Things, Smart Cities and Smart Grid
Submitted by grigby1 on Mon, 11/19/2018 - 12:31pm
sensors
party fusion center perspectives
probability
pubcrawl
quantisation (signal)
quantizer
resilience
Resiliency
scalar parameters
secure estimation
sensor networks
sensor outputs
parameter estimation
smart cities
Smart Grid
Smart Grid Sensors
stochastic encryption
telecommunication security
TPFC estimation
vector parameter estimation
wireless medium
wireless sensor networks
WSN
Internet of Things
binary stochastic encryption approach
Compositionality
Cryptography
encrypted nonbinary quantized data
encryption
encryption approaches
fixed threshold binary quantization limits parameter estimation
Human behavior
Human Factors
information security
asymptotic analysis
legitimate fusion center
LFC estimation
low complexity encryption
low complexity encryption approach
maximum likelihood estimation
maximum-likelihood estimation
mean square error methods
nonbinary generalized case
nonbinary quantized observations
optimal estimators
biblio
The Information Security System Synthesis Using the Graphs Theory
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
Russian Federation leISSlation
information security threats
optimal enterprise information protection system
optimality problem solution
optimality problem solution on the graph theory basis
protection vector isolation
pubcrawl
ranked descending graph construction
resilience
Resiliency
information security system synthesis based on graph theory
Scalability
security
security of data
Software
software complex basis
software information security
software restriction
tools
graph critical path
access subjects authentication
access subjects identification
computer storage media protection
enterprise information security
enterprise information security system
expert systems
FSTEC order No31
graph calculation
access delineation
graphs theory
graph theory
Hardware
hardware complex basis
hardware information security
Human behavior
information security
information security system synthesis
biblio
Diagnostics and Assessment of the Industrial Network Security Expert System
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
LPτ-sequence
Vulnerability
Software
security
Scalability
Resiliency
resilience
pubcrawl
nodal points
network security
Monte Carlo numerical method
Monte Carlo methods
Mathematical model
Markov processes
markov chain
manufacturing
Algorithm design and analysis
information security
Industrial Safety
industrial network virtual model
industrial network security expert system
Industrial engineering
Human behavior
expert systems
expert assessment
diagnostic system
diagnostic assessment
cyber-attacks sets
cyber-attacks classification
cyber-attack
computer network security
classification
biblio
The building of a security strategy based on the model of game management
Submitted by grigby1 on Fri, 10/26/2018 - 5:04pm
information security
theory games
systemic approach
security strategy
security of data
Scalability
pubcrawl
Process modeling
principles theory game
Metrics
Management
complex inter-dependencies
Human Factors
Games
game theory
game theoretic security
game management
Decision support systems
Cybersecurity
cyber security management
cost-efficient defense solutions
biblio
Usage of game theory in the internet wide scan
Submitted by grigby1 on Fri, 10/26/2018 - 5:04pm
internet mass scan
tools
Task Analysis
Scalability
pubcrawl
Network Scanning game
network games
network game
Metrics
masscan
internet wide scan
antagonistic game
internet
information security
Human Factors
honeypot/honeynet systems
Games
game theory
game theoretic security
computer network security
coalition antagonistic
biblio
Analysis of computer security incidents using fuzzy logic
Submitted by grigby1 on Fri, 10/26/2018 - 5:00pm
information security
the development of cyber-attack signatures
security
Russian ViPNet technology
Russian Federation
Resiliency
recommender systems
pubcrawl
Protocols
processing algorithm
Metrics
Information services
Algorithm design and analysis
Fuzzy logic
digital signatures
detection and prevention of cyber-attacks
design pattern SOPKA
cyberattacks
cyber-attacks
Computers
computer security incidents
computer security incident analysis
computer security
author signatures
biblio
Concept for Increasing Security of National Information Technology Infrastructure and Private Clouds
Submitted by grigby1 on Fri, 09/28/2018 - 4:04pm
IP networks
Unicast
Routing
Resiliency
resilience
pubcrawl
Protocols
private clouds
policy-based governance
Object recognition
object identifier
national information technology infrastructure
ISO standards
IPv6-protocol
IPv6-header
Cloud Computing
internet
information technology infrastructure
information security
Human behavior
government data processing
global routing prefix
global information community
e-governments
E-Government
Cybersecurity
computer network security
coding IPv6-addresses
codes of countries
clouds
biblio
Estimating Target Distribution in security assessment models
Submitted by grigby1 on Wed, 09/12/2018 - 11:13am
pubcrawl
Vulnerability
target distribution
Standards organizations
security of data
security monitoring system
security assessment
security
Resiliency
resilience
real-time systems
real-time system configuration
business data processing
Organizations
network security assessment models
Monitoring
information security
distributed processing
distributed computing
Databases
Damage Assessment
cyber-attacks
Computers
Computational modeling
biblio
Design pattern for secure object oriented information systems development
Submitted by grigby1 on Thu, 08/23/2018 - 11:57am
Metrics
user interface
Secure Software Design
secure object oriented information systems development
Secure Information Systems
object-oriented methods
object oriented design patterns
object oriented design framework
Design patterns
data availability
application security
object-oriented programming
Resiliency
security
data integrity
resilience
Unified modeling language
Information systems
Software
security of data
composability
data confidentiality
information security
pubcrawl
cyber-physical systems
Concurrency
« first
‹ previous
…
35
36
37
38
39
40
41
42
43
…
next ›
last »