Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information sharing
biblio
Central Situational Awareness System for Resiliency Enhancement of Integrated Energy Systems
Submitted by aekwall on Fri, 02/04/2022 - 10:34am
pubcrawl
uncertainty
renewable energy sources
Stochastic processes
Resiliency
Numerical models
information sharing
Integrated energy system
load shedding
Multi-microgrid formation
Power measurement
Situational awareness system
biblio
An Information Theoretic Approach to Assist in Identifying Counterfeit Consumer Goods
Submitted by grigby1 on Mon, 01/10/2022 - 12:16pm
pubcrawl
Township Community
tools
Spaza-Shop
Scalability
RSA private-key decryption
Resiliency
resilience
QR code
public-key encryption
Public key
android
Prediction algorithms
Metrics
information sharing
Human behavior
encryption
Databases
codes
Cloud Storage Database
android encryption
biblio
An Architecture for National Information Sharing and Alerting System
Submitted by aekwall on Mon, 11/29/2021 - 2:09pm
security
Computer crime
pubcrawl
Resiliency
composability
Prototypes
Predictive Metrics
Government
situational awareness
critical infrastructure
information management
information sharing
information sharing and alerting system
national situational awareness
SA architecture
biblio
Cyber Supply Chain Risk Management
Submitted by willirn1 on Tue, 10/26/2021 - 10:59am
systems security engineering
Executive Order 13636
Cyberspace Policy Review
Cybersecurity Strategy and Implementation Plan
Cybersecurity Enhancement Act
Comprehensive National Cybersecurity Initiative
software & firmware
Hardware
cloud & virtualization
Vulnerability Management
C-SCRM
security programs & operations
security measurement
security controls
risk assessment
malware
information sharing
cyber supply chain risk management
controls assessment
biblio
Chain-of-Evidence in Secured Surveillance Videos using Steganography and Hashing
Submitted by aekwall on Wed, 07/07/2021 - 4:56pm
Task Analysis
Reliability
surveillance
hashing
information sharing
Law
social networking (online)
Steganography
TV
video recording
Video Security
video surveillance
pubcrawl
Metrics
Resiliency
Human behavior
biblio
Practical Vulnerability-Information-Sharing Architecture for Automotive Security-Risk Analysis
Submitted by grigby1 on Wed, 03/17/2021 - 12:42pm
hyper-connected society
automotive security-risk analysis
automotive vehicles
car-hacking studies
car-hacking techniques
common-vulnerabilities- exposure system
cyber kill chain-based cyberattack analysis method
electronic control devices
formal vulnerability-analysis system
automotive industry
ICT environment
information security techniques
mechanical devices
security risk analysis
systematic security-risk-assessment
vehicle-related cyberattacks
vulnerability-information-sharing architecture
Chained Attacks
Computer crime
resilience
Resiliency
automobiles
Automotive engineering
Autonomous Driving
Scalability
5G mobile communication
Industries
pubcrawl
risk analysis
information sharing
traffic engineering computing
Cyber Kill Chain
automotive cybersecurity
Ransomware
5g network
automotive CVE
biblio
Cyber physical surveillance system for Internet of Vehicles
Submitted by grigby1 on Mon, 11/02/2020 - 12:10pm
smart automotive industry
Internet of Things
Internet of Vehicles
IoV system
Metrics
novel cyber-physical surveillance system framework
pubcrawl
resilience
Resiliency
Intelligent Transportation Systems
smart connected framework
smart IoV
smart people crowd
Smart Vehicles
smart vehicular crowd
surveillance
vehicular ad hoc networks
Automotive engineering
Intelligent Transportation System
Intelligent sensors
information sharing
Human Factors
Entropy
cyber-physical systems
cyber security mechanism
cyber physical surveillance system
crowded space
crowded place
crowded environment
connected peoples
connected crowd
computer network security
Cloud Computing
biblio
Blockchain-Based Internet of Vehicles (IoV): An Efficient Secure Ad Hoc Vehicular Networking Architecture
Submitted by aekwall on Mon, 10/19/2020 - 11:47am
connected vehicles
secured communication
secure ad hoc vehicular networking architecture
distribution cloud
distributed access control system
connected vehicle communication network
blockchain-based Internet of Vehicles
information sharing
network resources
Smart City
cyber physical systems
IoV
Internet of Vehicles
distributed control
telecommunication network reliability
security
Human Factors
blockchain technology
Intelligent sensors
Reliability
blockchain
Metrics
vehicular ad hoc networks
privacy
pubcrawl
Human behavior
Resiliency
telecommunication security
Internet of Things
telecommunication traffic
biblio
Research on Governmental Data Sharing Based on Local Differential Privacy Approach
Submitted by grigby1 on Fri, 10/16/2020 - 11:24am
information sharing
statistical data
statistical analysis
sharing statistics
Resiliency
resilience
pubcrawl
private blockchain
Privacy-preserving
privacy protection models
privacy disclosure
privacy
policy-based governance
Peer-to-peer computing
local differential privacy
blockchain
information management
governmental departments
governmental data sharing
government information resources
government departments
government data processing
Government
e-government applications
E-Government
differential privacy
data sharing
data privacy
Cybersecurity
collaboration
biblio
SwitchMan: An Easy-to-Use Approach to Secure User Input and Output
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
SwitchMan
pubcrawl
resilience
Resiliency
Scalability
secure protocol
secure user input
security
Servers
Switches
Protocols
usability
usability analysis
user I-O paths
user interfaces
user protected account
user regular account
user screen output
user-level APIs
user-level malware attacks
invasive software
automatic account switching
BIOS Security
computer architecture
computer security
Human Factors
I-O Systems
i-o systems security
information sharing
Input/Output Security
application program interfaces
Keyboards
Linux
mac
malware
Metrics
operating systems
operating systems (computers)
performance evaluation
personal computers
« first
‹ previous
1
2
3
4
5
next ›
last »