Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues
Submitted by grigby1 on Wed, 03/08/2017 - 1:29pm
quadratic residue
supply chains
Supply Chain
Servers
Security analysis
security
secure RFID tag ownership transfer protocol
RFID-OT protocol improvement
RFID
radiofrequency identification
radio frequency identification
Quadratic Residues
cryptanalysis
pubcrawl170112
Protocols
protocol
probability
privacy
Ownership Transfer
Information systems
desynchronization attack
Cryptography
Cryptographic Protocols
biblio
The Design of Brand Cosmetics Anti-counterfeiting System Based on RFID Technology
Submitted by grigby1 on Wed, 03/08/2017 - 1:29pm
RFID technology
nonsecurity phenomena
product logistics information tracing
product logistics information tracking
production engineering computing
pubcrawl170112
Radiation detectors
radiofrequency identification
RFID (Radio Frequency Identification) technology
luxury cosmetics brand
sales methods
security
supply chain channels
supply chain management
supply chains
system-EPC system
visual information management system
analysis and design
information management
hard security phenomena
gray goods
false security phenomena
fake goods
distributed RFID tracking
digital authentication security technology
Databases
counterfeit goods
cosmetics brand distribution channels
cosmetics
cosmetic
brand cosmetics anticounterfeiting system
authentication
anticounterfeiting security system
biblio
A Modelling Framework for Managing Risk-Based Checkpoint Screening Systems with Two-Type Inspection Queues
Submitted by grigby1 on Wed, 03/08/2017 - 1:29pm
pubcrawl170112
two-type inspection queues
supply chains
Steady-state
Stability analysis
Selectee Lanes
security checkpoints
security checkpoint
security
risk-based checkpoint screening system management
risk level
queueing theory
Airports
optimization model
optimisation
Normal Lanes
National security
multi-server queue
mix-integer non-linear programming model
inspection queues
Inspection
delays
congestion
Biological system modeling
biblio
SLA-Based Secure Cloud Application Development: The SPECS Framework
Submitted by grigby1 on Wed, 03/08/2017 - 1:28pm
security of data
user-defined security feature
Unified modeling language
supply chains
SPECS framework
SPECS
SLA-based secure cloud application development
security-enhanced service
security-as-a-service
security SLA
security service level agreement
API
security
secure Web server
Secure Cloud Application Development
pubcrawl170112
Monitoring
contracts
Context
Cloud Computing
application program interfaces
biblio
Securing the supply chain for commodity IT devices by automated scenario generation
Submitted by grigby1 on Wed, 03/08/2017 - 1:28pm
security of data
Hardware
Homeland Security
Microprogramming
nonUS suppliers
operating systems
program analysis
program diagnostics
pubcrawl170112
security
grave vulnerabilities
software components
static program analysis
Supply Chain
supply chain management
supply chain security
supply chains
Theseus
vetting process
component interaction mapping
attack graph generation
attack graph generation algorithms
automated scenario generation
Boolean functions
Boolean satisfiability solver
checklist generation workflow
commodity devices
commodity IT devices
adversary goals
computer architecture
cyber-attacks
DARPA VET program
DP industry
firmware
firmware-software architecture
FW-SW
graph theory
biblio
Object event visibility for anti-counterfeiting in RFID-enabled product supply chains
Submitted by grigby1 on Wed, 03/08/2017 - 1:28pm
object-centric coding mechanism
track-and-trace
taxonomy
system architecture framework
supply chains
supply chain management
Supply Chain
security measures
security
RFID-enabled product supply chain visibility
radiofrequency identification
pubcrawl170112
production engineering computing
anti-counterfeiting
object-based event “pedigree”
object event visibility
event pedigree
event exception detection
EPC-based events
Engines
e-pedigree
dynamically updated e-pedigree
Databases
counterfeiting activities
counterfeiting
anticounterfeiting
biblio
Research on income distribution model of supply chain financing based on third-party trading platform
Submitted by grigby1 on Wed, 03/08/2017 - 1:26pm
industrial economics
third-party trading platform
supply chains
supply chain financing
Stability analysis
Shapley value
security
risk correction factors
risk analysis
remuneration
pubcrawl170112
AHP
income unequal distribution
income fluctuation
income distribution model
game theory
ethics
cooperative game
Companies
Banking
analytic hierarchy process
biblio
Risk assessment of agricultural supply chain based on AHP- FCS in Eastern Area of Hunan Province
Submitted by grigby1 on Wed, 03/08/2017 - 1:26pm
natural disasters
the AHP- FCS method
supply chains
Supply Chain
security
risk management
risk assessment
risk analysis
Reliability
pubcrawl170112
agricultural product
Hunan province
fuzzy set theory
fuzzy comprehensive analysis
Face
economic development stability
analytic hierarchy process
AHP- FCS
agricultural supply chain
agricultural products
biblio
A methodology to improve the assessment of vulnerability on the maritime supply chain of energy
Submitted by grigby1 on Wed, 03/08/2017 - 1:25pm
Oceans
worldwide maritime network
world traffic
vulnerability assessment
transportation possibilities
Transportation
supply chains
supply chain management
spatial structure
security
Sea measurements
raw materials
pubcrawl170112
Ports (Computers)
economic dependency
network modelling
merchant navy
maritime territories
maritime supply chain
maritime safety
maritime network
marine systems
marine communication
industrialized countries
graph theory
freight distribution
freight containers
freight containerization
biblio
Current efforts in ports and supply chains risk assessment
Submitted by grigby1 on Wed, 03/08/2017 - 1:25pm
pubcrawl170112
supply chains
supply chain risk assessment
supply chain partners
Supply Chain
standards
security of data
security
sea ports
risk management
risk assessment
CII
Ports (Computers)
port service risk assessment
physical /cyber security
maritime supply chain processes
Marine vehicles
marine engineering
goods dispatch data processing
critical infrastructures
critical information infrastructures
complex interrelated ICT systems
« first
‹ previous
…
402
403
404
405
406
407
408
409
410
…
next ›
last »