Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information sharing
file
Best_Improved_Cyber_Threat_TB.pdf
Submitted by Jamie Presken on Tue, 08/01/2017 - 1:59pm
August'17
CMU
cyber security
information sharing
privacy
Real-time Privacy Risk Evaluation and Enforcement
Risk
threat indicators
biblio
Improved cyber threat indicator sharing by scoring privacy risk
Submitted by Jamie Presken on Tue, 08/01/2017 - 1:58pm
August'17
CMU
cyber security
information sharing
privacy
Real-time Privacy Risk Evaluation and Enforcement
Risk
threat indicators
CMU
Real-time Privacy Risk Evaluation and Enforcement
August'17
biblio
A Model for Secure and Mutually Beneficial Software Vulnerability Sharing
Submitted by grigby1 on Mon, 05/22/2017 - 1:52pm
collaboration
composability
Human behavior
information sharing
information theoretic security
Metrics
private set operations
pubcrawl
Resiliency
Scalability
secure multiparty computation
security economics
biblio
Shall We Collaborate?: A Model to Analyse the Benefits of Information Sharing
Submitted by grigby1 on Fri, 05/19/2017 - 1:55pm
Computing Theory
Cybersecurity
game theory
Human behavior
information sharing
pubcrawl
trust
biblio
Identify Visual Human Signature in community via wearable camera
Submitted by grigby1 on Wed, 03/08/2017 - 2:14pm
pubcrawl170113
weighted voting fusion
Weighted Voting
Wearable devices
Wearable Device
wearable computers
wearable camera
visualization
visual patches
visual human signature
VHS recognition
sensor fusion
security of data
Robustness
Cameras
multiview celebrity identity dataset
MCID
information sharing
image recognition
Human Attributes
feature extraction
facial attributes
facial appearance
Face
Databases
Communities
clothing attributes
Clothing
biblio
An evolutionary game-theoretic framework for cyber-threat information sharing
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
evolutionary stable strategy
Statistics
spanning industry
Sociology
self-enforced evolutionary stability
security of data
pubcrawl170109
military agencies
Investment
information sharing
information management
Incentive Model
Games
game theory
federal institutions
academia
Evolutionary Game Theory
evolutionary game theoretic strategy
evolutionary game theoretic framework
evolutionary computation
ESS
CYBEX framework
CYBEX
cybersecurity information exchange
Cybersecurity
cyber threat information sharing
cyber crimes
computer security
combat cyber attacks
collaborative effort
biblio
"Security information sharing for the polish power system"
Submitted by abfox on Tue, 02/14/2017 - 2:24pm
multi-agent systems
Substations
substation
Stakeholders
security of data
SCADA systems
SCADA system
pubcrawl170101
power system security
power generation
power engineering computing
Polish power system
multiagent architecture
anonymity
information sharing security
information sharing
information security
information management
information exchange
information and communication technology
Electric Grid
distributed control system
distributed control
cybersecurity technology
cyberattack
Computer crime
biblio
A support middleware solution for e-healthcare system security
Submitted by BrandonB on Wed, 05/06/2015 - 2:10pm
Logic gates
wireless sensor networks
system security
support middleware solution
security vulnerabilities
security of data
patient information security
patient information privacy
network security
middleware
Medical services
medical administrative data processing
masquerade attack
authentication
Internet security
information sharing
health care-specific security standards
health care organizations
health care
electronic health care
e-Healthcare
e-health care system security
Data Security
data privacy
data integrity
Communication system security
biblio
Unified multi-critical infrastructure communication architecture
Submitted by BrandonB on Tue, 05/05/2015 - 12:38pm
Interdependency
unified multicritical infrastructure communication architecture
Subscriptions
situational awareness
security
quality of service
Publish/Subscribe
private sector
Monitoring
interdependent infrastructure nodes
communication model
information sharing
information network
information management
government sector
Data models
critical infrastructures
critical infrastructure
computer network reliability
biblio
Fusing Open Source Intelligence and Handheld Situational Awareness: Benghazi Case Study
Submitted by BrandonB on Tue, 05/05/2015 - 12:31pm
open source intelligence information
US Diplomatic mission
ubiquitous computing
Twitter data
Twitter
table top exercise
social networking (online)
social media streaming
social media
situational awareness
real-time systems
real time processing
Prototypes
prototype capabilities
Personnel
OSINT information
Benghazi case study
open source intelligence
National security
Media
Libya
information sharing
History
historical analysis
events attack
edge operators
contingency operations
context computing
context aware handheld situational awareness framework
Context
command and control systems
« first
‹ previous
1
2
3
4
5
next ›
last »