Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ontologies
biblio
Rendering Trustability to Semantic Web Applications-Manchester Approach
Submitted by grigby1 on Mon, 03/26/2018 - 11:55am
Resiliency
Web pages
web of trust
University Ontology
Trusted Computing
trustability
trust
Syntactics
Semantics
semantically annotated tags
semantic Web documents
semantic Web applications-manchester approach
Semantic Web
composability
resilience
pubcrawl
Provenance
OWL
Ontology
ontologies (artificial intelligence)
Ontologies
Manchester Syntax
Intelligent web
intelligent knowledge retrieval
information retrieval
Data models
biblio
SPE: Security and Privacy Enhancement Framework for Mobile Devices
Submitted by K_Hooper on Wed, 02/28/2018 - 10:35am
Multimedia communication
unmodified mobile operating systems
SPE
sensors
sensing
security of data
security and privacy enhancement
security
Resiliency
pubcrawl
privacy
operating systems (computers)
operating systems
Ontology
ontologies (artificial intelligence)
Ontologies
android
Mobile Security
mobile privacy
Mobile handsets
mobile devices
mobile computing
Metrics
iOS Security
iOS (operating system)
ios
Human Factors
encryption
data privacy
Compositionality
Android (operating system)
biblio
Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage
Submitted by grigby1 on Tue, 02/06/2018 - 12:58pm
encryption
trustworthy access control
trusted platform modules
Trusted Computing
storage management
semantically rich access control system
robust access control
Resiliency
pubcrawl
OWL
Organizations
organization confidentiality policies
Ontologies
Oblivious Storage
end-to-end oblivious data transaction
Access Broker
document security
document handling
data threats
Confidentiality Policy
Computational modeling
composability
cloud storage security
cloud service platform
Cloud Computing
business data processing
authorisation
Access Control
access broker module
biblio
A Data Driven Approach for the Science of Cyber Security: Challenges and Directions
Submitted by grigby1 on Thu, 12/28/2017 - 12:34pm
Metrics
Trusted Computing
sos
security of data
Security Metrics
Science of Security
science of cyber security
Scalability
risk-based approach
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
policy-based sharing
Ontologies
Attack detection
Measurement
Human Factors
Human behavior
Forensics
data trustworthiness
data driven science
data driven approach
Context
computer security
composability
collaboration
cognition
attack mitigation
biblio
Recovering Semantic Traceability Links between APIs and Security Vulnerabilities: An Ontological Modeling Approach
Submitted by K_Hooper on Wed, 12/20/2017 - 10:31am
software houses
safety-critical software
security
security knowledge
security vulnerability
semantic traceability link recovery
Semantic Web
Semantics
Software
software engineering community
Resiliency
software industry globalization
software knowledge
software products
Source code analysis
traceability improvement
trust improvement
Unified modeling language
vulnerabilities and patches
ontological modeling approach
APIs
code reuse
code sharing
Computational modeling
Databases
global software ecosystem
Information Reuse
information silos
Knowledge modeling
API
Ontologies
ontologies (artificial intelligence)
ontology-based knowledge modeling approach
project boundaries
proprietary knowledge representation
pubcrawl
reasoning
reasoning services
biblio
An interoperable approach for Sensor Web provenance
Submitted by grigby1 on Tue, 12/12/2017 - 12:27pm
Sensor Web
provenance information
provenance model
pubcrawl
Resiliency
Semantic Web
Semantic Web technologies
sensor observation data
sensor observations
Provenance
Sensor Web domain vocabularies
Sensor Web provenance
usability
Vocabulary
W3C
W3C PROV
W3C PROV data model
complex information space
OWL
open systems
Ontologies
Metrics
linked data approach
Linked Data
interoperable approach
interoperability
internet
Human Factors
Human behavior
Data models
data analysis
Compositionality
composability
biblio
The Arabic Knowledge Graph: Opportunities and Challenges
Submitted by grigby1 on Tue, 12/12/2017 - 12:19pm
natural language processing
Semantics
Semantic Web
Scalability
Resiliency
question answering (information retrieval)
query answering
pubcrawl
Opportunities
Ontologies
NLP
AKG
Metadata Discovery Problem
Linked Data
internet
graph theory
feature extraction
Encyclopedias
Electronic publishing
Compositionality
challenges
Arabic knowledge graph
biblio
WorkflowHunt: Combining Keyword and Semantic Search in Scientific Workflow Repositories
Submitted by grigby1 on Tue, 12/12/2017 - 12:19pm
Compositionality
data analysis
metadata
Metadata Discovery Problem
Ontologies
pubcrawl
Resiliency
Scalability
Systems architecture
biblio
Cyber security risk management for health-based critical infrastructures
Submitted by grigby1 on Mon, 12/04/2017 - 11:58am
Metrics
Systems
security of data
security
secure recovery
Scientific Computing Security
risk management
Resiliency
recovery
pubcrawl
PhD project
Ontologies
modeling
Biological system modeling
Medical services
health-based critical infrastructures
health care critical infrastructures
health care
Health
cyber-physical systems
cyber-physical security
cyber-physical
critical infrastructures
computer security
Compositionality
biblio
Research of Secure Service Composition Based on Semantic Security Policy
Submitted by grigby1 on Mon, 11/20/2017 - 11:25am
Protocols
web services
syntactic approaches
subsumption
service composition
Semantics
semantic security policy
Semantic
security policy
security policies
security of data
secure service composition
pubcrawl
cognition
policy-based governance
Policy
ontologies (artificial intelligence)
Ontologies
matching algorithm
government policies
Government
Governance
general security ontology
encryption
definition method
collaboration
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »