Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information security
biblio
Investigation of Computer Incidents as an Important Component in the Security of Maritime Transportation
Submitted by grigby1 on Fri, 11/25/2022 - 5:48pm
Transportation
modern shipping
Policy Based Governance
pubcrawl
Reliability
resilience
Resiliency
reverse engineering
Scalability
Science of Security
security system
Software
tools
Metrics
automated information system
collaboration
composability
computer incident
computer security
cyber-attacks
forensic science
framework
Human behavior
Human Factors
information security
malware
biblio
Analysis of existing standards for information security assessment
Submitted by grigby1 on Fri, 11/18/2022 - 2:17pm
information security
Organizations
pubcrawl
policy-based governance
collaboration
Software
Industries
Standards organizations
information science
Communications technology
Security Policies Analysis
Control Objectives for Information and Related Technologies (COBIT)
COSO
ISO/IEC 17799:2005
SAS 78/94
Singapore Accreditation Council (SAC)
biblio
Mobile APP Personal Information Security Detection and Analysis
Submitted by grigby1 on Fri, 11/18/2022 - 2:17pm
information security
pubcrawl
policy-based governance
collaboration
privacy
static analysis
Manuals
Force
personal information
information science
Software Testing
Security Policies Analysis
Memory
Mobile app
biblio
Design and Implementation of Security Test Pipeline based on DevSecOps
Submitted by grigby1 on Fri, 11/18/2022 - 2:07pm
Software
Security Risk Management
devsecops
Security test
project management
Pipelines
security vulnerability
maintenance engineering
Scalability
information security
Conferences
Resiliency
resilience
Metrics
Human Factors
Human behavior
pubcrawl
security
biblio
Implementation of the Risk-based Approach Methodology in Information Security Management Systems
Submitted by grigby1 on Fri, 11/18/2022 - 2:06pm
Companies
Security Risk Management
ISO 31000
ISO 27001
Risk
quality management
Systematics
Management system
Production
ISO standards
information security
Standards organizations
Scalability
Resiliency
resilience
Metrics
Human Factors
Human behavior
pubcrawl
risk management
biblio
Securing Sensitive Data Through Corner Filters, Chaotic Maps and LSB Embedding
Submitted by grigby1 on Thu, 10/20/2022 - 4:01pm
Cryptography
information security
pubcrawl
Metrics
privacy
composability
chaotic communication
Three-dimensional displays
Noise measurement
Steganography
PSNR
measurement uncertainty
chaotic function
corner detection
steganography detection
biblio
Windows Communication Foundation Penetration Testing Methodology
Submitted by grigby1 on Thu, 10/20/2022 - 3:15pm
operating systems
Windows Communication Foundation
service contracts
communication bindings
C\# programming
.NET Framework
Resiliency
Windows Operating System Security
Penetration Testing
security
Windows
Buildings
composability
information security
Planning
resilience
Metrics
pubcrawl
biblio
Phishing Web Page Detection Methods: URL and HTML Features Detection
Submitted by grigby1 on Wed, 10/12/2022 - 2:38pm
feature extraction
Human behavior
information security
machine learning
Phishing
Phishing Detection
phishing webpage
pubcrawl
Syntactics
Training data
Uniform resource locators
URL and HTML features
Web pages
biblio
Approaches and Methods for Assessing the Information Security of Data Transmission Networks
Submitted by grigby1 on Thu, 10/06/2022 - 3:19pm
Named Data Network Security
transmission
risks
queening systems
mathematical models
Resiliency
Communications technology
information science
data
data communication
information security
Network
resilience
Probabilistic logic
probability
Scalability
Human Factors
Human behavior
pubcrawl
biblio
Algorithmic method of security of the Internet of Things based on steganographic coding
Submitted by aekwall on Fri, 09/30/2022 - 2:45pm
mechatronics
stego image
RGB
PSNR
LSB
Histogram
grayscale metod
Color
Steganography
Gray-scale
information security
IoT security
encoding
composability
Human behavior
Resiliency
Metrics
pubcrawl
Conferences
IoT
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »