Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Security Awareness and Affective Feedback: Categorical Behaviour vs. Reported Behaviour
Submitted by grigby1 on Tue, 02/06/2018 - 2:06pm
Monitoring
user monitoring techniques
user feedback
Usable Security
tools
situational awareness
security of data
Security Awareness
secure online behaviour
Resiliency
pubcrawl
positive behavioural changes
affective feedback
Metrics
human factors of cybersecurity
end-user-security behaviour
End-user security behaviour
education
computer security
composability
Color
categorical information users
categorical behaviour
Avatars
biblio
Towards Automation in Information Security Management Systems
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
small and medium-sized enterprises
Process Automation
pubcrawl
Resiliency
risk management
Scalability
security controls automation
security of data
security requirements
Metrics
small-to-medium enterprises
Stakeholders
standards
tools
ubiquitous computing
Ubiquitous Computing Security
workflow enactment
information protection
automated process execution
automation
context-aware ISMS
continuous risk-driven ISMS
Data protection
highly interconnected information security management
Human behavior
Human Factors
ADAMANT
information security
Information Security Management System
information security management systems
Information Security Risk Management
Information systems
ISMS related activities
ISO 27001 compliant ISMS
biblio
Minimum Cost Security Measurements for Attack Tree Based Threat Models in Smart Grid
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
real-time systems
Ubiquitous Computing Security
tools
smart meters
Smart Grids
smart grid security
security
Scalability
Resiliency
attack tree
pubcrawl
privacy
Metrics
Meters
Human Factors
Human behavior
energy theft
cost optimization
biblio
Securing Big Data in the Cloud with Integrated Auditing
Submitted by grigby1 on Tue, 02/06/2018 - 1:43pm
Scalability
Integrated
integrated auditing
Metrics
Organizations
Policy
pubcrawl
real-time systems
Resiliency
infrastructure auditing
security
security of data
Standards organizations
Stochastic Computing Security
storage management
tools
transaction log security
access management
Identity management
Human Factors
granular auditing
data storage security
data privacy
data legality
data analysis
cyber threats
Cloud Security
Cloud Computing
cloud
big data security
big data privacy
Big Data
auditing
biblio
Topic Evolution Modeling in Social Media Short Texts Based on Recurrent Semantic Dependent CRP
Submitted by grigby1 on Tue, 02/06/2018 - 1:34pm
semantic dependent Chinese restaurant process
word co-occurrence modeling
Twitter dataset
topic modeling
tools
Text Mining
text analytics
text analysis
social networking (online)
Social network services
social media short texts
Social Media Analytics
short-text oriented topic evolution model
Semantics
semantic similarity information
Adaptation models
sdTEM
Scalability
rsdCRP
recurrent semantic dependent CRP
pubcrawl
Metrics
Media
LDA
Human Factors
Human behavior
HDP
Data models
composability
Analytical models
biblio
Managing Assurance Cases in Model Based Software Systems
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
pubcrawl
vehicle control
traffic engineering computing
tools
Standards organizations
software quality
software development organizations
software assurance
Software
social networks
Scalability
Safety
road vehicles
road safety
reuse
regulatory compliance
assurance cases
model management techniques
model management
model based software systems
ISO standards
ISO 26262 standard
impact assessment
functional safety
financial service
Context
composability
compliance management
co-evolution
Automotive engineering
automotive domain
automobiles
biblio
Improving Attention to Security in Software Design with Analytics and Cognitive Techniques
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
software design
security
security design
Security Engineering
security knowledge
security of data
social aspects of automation
Software
software assurance
secure software
software development life cycle
software engineering
software security
testing
threat
tools
Vulnerability
encoding
build security in
building security in
Buildings
chasm
cognitive techniques
composability
developer productivity
diverse development organization
automated tools
Organizations
pubcrawl
Scalability
SDLC
secure design
secure development
secure engineering
biblio
FairTest: Discovering Unwarranted Associations in Data-Driven Applications
Submitted by K_Hooper on Fri, 02/02/2018 - 11:02am
machine learning algorithms
Algorithmic Fairness
algorithmic fairness formalization
Computer bugs
data analysis
Data collection
data privacy
data-driven applications
debugging capabilities
Decision Making
decision-making
fairness metrics
FairTest
Google
unwarranted association discovery
Measurement
Medical services
Metrics
Predictive Metrics
program debugging
pubcrawl
sensitive user attributes
software tools
Statistics
Systems
testing
tools
UA framework
biblio
RicherPicture: Semi-automated cyber defence using context-aware data analytics
Submitted by grigby1 on Tue, 01/23/2018 - 4:01pm
Resiliency
Electronic mail
incident response strategy
information
learning (artificial intelligence)
nonnetwork data
operational aspects
organisation
organisational data
pubcrawl
decision-making process
RicherPicture
security
security of data
Security Operation Centre environment
synthetic scenarios
technological developments
threat intelligence data
tools
visual analytics
correlating network data
attack-trend data
automated network defences
automated network-defence actions
Automated Response Actions
Business
composability
Computer crime
computer science
context-aware data analytics
attack-surface
cyber attacks detection
cyber attacks prevention
Cyber defence
cyber-threat landscape
data analysis
data sources
data visualisation
Decision Making
biblio
Scalable cyber-security analytics with a new summary-based approximate query engine
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
Network Event Log Analytics
tools
Summary Data Processing
security
Scalable Security
scalable
Scalability
relational database security
pubcrawl
Approximate Query Engines
Monitoring
Information Granulation
Fuzzy Similarity of Complex Objects
Engines
Electronic mail
Databases
computer security
« first
‹ previous
…
54
55
56
57
58
59
60
61
62
next ›
last »