Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer theory
biblio
Discussion on the Ways of Constructing Computer Network Security in Colleges: Considering Complex Worm Networks
Submitted by grigby1 on Fri, 04/28/2023 - 3:01pm
complex networks
Complex Worm Networks
Colleges and Universities
Application software
policy governance
Resiliency
Buffer overflows
computer network security
computer theory
computer networks
Compositionality
collaboration
composability
Computational modeling
Analytical models
Software
resilience
Metrics
Human behavior
pubcrawl
security
feature extraction
biblio
Pay or Not Pay? A Game-Theoretical Analysis of Ransomware Interactions Considering a Defender’s Deception Architecture
Submitted by grigby1 on Fri, 04/28/2023 - 3:01pm
computer security
advanced persistent threats (apt)
Cyber-security
policy governance
Minimization
Resiliency
computer theory
game theory
Ransomware
Compositionality
computer architecture
composability
Cryptography
resilience
Metrics
Human behavior
pubcrawl
security
collaboration
biblio
Research on Enterprise Information Security Risk Assessment System Based on Bayesian Neural Network
Submitted by grigby1 on Fri, 04/28/2023 - 3:00pm
Data models
fuzzy theory
Bayesian Regularization
policy governance
Resiliency
computer theory
risk assessment
Stability criteria
simulation
Compositionality
composability
Training
resilience
Metrics
Human behavior
pubcrawl
Neural networks
security
Organizations
information security
collaboration
biblio
A Game Theory based Attacker Defender Model for IDS in Cloud Security
Submitted by grigby1 on Fri, 04/28/2023 - 3:00pm
game theory
Whales
simulation
security
Resiliency
resilience
pubcrawl
policy governance
optimization
Neural networks
Metrics
Human behavior
IDS
estimation
Deep Neural Network
deep learning
computer theory
Computational modeling
Compositionality
composability
collaboration
cloud computing security
Cloud Computing
CICIDS-2018 dataset
biblio
Security and Privacy
Submitted by grigby1 on Fri, 04/28/2023 - 3:00pm
security controls
SDN/NFV
mMTC
cyber risk assessment and management
5G Cybersecurity
computer network reliability
policy governance
URLLC
Resiliency
computer theory
threat scenarios
cyber-attacks
Reliability
network function virtualization
defense
computer architecture
mitigation
Compositionality
Complexity theory
Data protection
composability
5G mobile communication
resilience
Metrics
Human behavior
pubcrawl
security
risk management
collaboration
privacy
biblio
Analyzing Initial Design Theory Components for Developing Information Security Laboratories
Submitted by grigby1 on Fri, 04/28/2023 - 2:59pm
Cryptography
infosec lab
design Theory
action design research
policy governance
Resiliency
computer theory
Laboratories
Compositionality
composability
Training
privacy
resilience
Metrics
Human behavior
pubcrawl
security
information security
collaboration
biblio
Research on Network Confrontation Information Security Protection System under Computer Deep Learning
Submitted by grigby1 on Fri, 04/28/2023 - 2:59pm
Computational modeling
network confrontation
policy governance
computer
Resiliency
data science
object detection
computer theory
Compositionality
composability
Adaptation models
resilience
Metrics
Human behavior
pubcrawl
security
information security
collaboration
Training
deep learning
biblio
A Modeling Method of Cyberspace Security Structure Based on Layer-Level Division
Submitted by grigby1 on Fri, 04/28/2023 - 2:59pm
network topology
level division
layer division
cyberspace security structure
policy governance
Resiliency
computer theory
graph theory
Cyberspace
computational complexity
Compositionality
collaboration
computer security
composability
Topology
Computational modeling
resilience
Metrics
Human behavior
pubcrawl
security
biblio
Network Security Situation Assessment Method Based on Absorbing Markov Chain
Submitted by grigby1 on Fri, 04/28/2023 - 2:59pm
Compositionality
situation assessment
network assets
Absorbing Markov chain
policy governance
Resiliency
computer theory
graph theory
Markov processes
collaboration
network security
composability
Computer crime
resilience
Metrics
Human behavior
pubcrawl
security
biblio
The Design and Realization of Information Security Technology and Computer Quality System Structure
Submitted by grigby1 on Fri, 04/28/2023 - 2:58pm
Routing
research and analysis
information security technology
Design and implementation
computer quality architecture
policy governance
Resiliency
computer theory
Design methodology
computer networks
Compositionality
computer architecture
composability
system-on-chip
Hardware
resilience
Metrics
Human behavior
pubcrawl
security
information security
collaboration
1
2
3
next ›
last »