Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information management
biblio
Intelligent System and Human-Computer Interaction for Personal Data Cyber Security in Medicaid Enterprises
Submitted by grigby1 on Fri, 09/08/2023 - 10:09am
information management
Medicaid enterprise
intelligent system
enterprise resource planning
Data Warehouse
data warehouses
intelligent data
data flow
cyber-physical system
human computer interaction
Human-computer interaction
Compositionality
security
personal data
Internet of Things
composability
cyber security
Medical services
Scalability
Hardware
Software
Resiliency
resilience
pubcrawl
biblio
A Crawler-based Digital Forensics Method Oriented to Illegal Website
Submitted by grigby1 on Fri, 09/01/2023 - 3:19pm
network topology
network crime
illegal website
Crawler
Human Factors
Crawlers
automation
information forensics
information management
Digital Forensics
Tag clouds
internet
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Design of Information Management System for Students' Innovation Activities Based on B/S Architecture
Submitted by grigby1 on Wed, 07/19/2023 - 3:41pm
computer architecture
pubcrawl
resilience
Computational modeling
Computers
information management
Compositionality
Systematics
Technological innovation
education
authentication technology
Resiliency
B/S architecture
information management system
JSP
expandability
biblio
Key Feature Mining Method for Power-Cut Window Based on Grey Relational Analysis
Submitted by aekwall on Fri, 03/03/2023 - 10:53am
Data mining
power-cut window
maintenance plan
key features
grey relational analysis
key management
power system reliability
maintenance engineering
information management
Big Data
Planning
Manuals
power grids
Human behavior
Resiliency
Metrics
Scalability
pubcrawl
biblio
Development of Key Technologies of Legal Case Management Information System Based on J2EE
Submitted by aekwall on Fri, 03/03/2023 - 10:51am
information management
Process design
legal case management
key technology
J2EE technology
information system
Information age
key management
Management information systems
Law
Java
Technological innovation
Human behavior
Resiliency
Metrics
Scalability
pubcrawl
biblio
A workflow and toolchain proposal for analyzing users’ perceptions in cyber threat intelligence sharing platforms
Submitted by grigby1 on Fri, 09/30/2022 - 1:31pm
tools
Training
pubcrawl
Human behavior
Conferences
Analytical models
Computer crime
Proposals
Cybersecurity
information management
biblio
Non-Invertibility for Random Projection based Biometric Template Protection Scheme
Submitted by grigby1 on Tue, 09/20/2022 - 2:33pm
pubcrawl
Metrics
resilience
Scalability
authentication
Cryptography
information management
biometrics (access control)
Resiliency
biometric template protection
discriminability
fuzzy commitment
non-invertibility
random projection
Fuzzy Cryptography
biblio
Vulnerability Assessment and Attack Simulation of Power IoT Based on the Attractiveness of Equipment Assets
Submitted by grigby1 on Fri, 07/29/2022 - 9:02am
tools
pubcrawl
resilience
Resiliency
Conferences
Software
Hardware
Scalability
Metrics
information management
vulnerability assessment
automation
power systems
power IoT
attack simulation
power grid vulnerability analysis
biblio
Design and Implementation of a Secure QR Payment System Based on Visual Cryptography
Submitted by aekwall on Thu, 07/14/2022 - 4:16pm
Logic gates
Cryptography
visualization
Servers
pubcrawl
Resiliency
Receivers
Mobile Applications
cyber-physical systems
information management
visual cryptography
online payment systems
QR codes
biblio
A Blockchain Based Link-Flooding Attack Detection Scheme
Submitted by aekwall on Fri, 07/01/2022 - 9:45am
blockchain
internet
Intrusion Detection
Conferences
pubcrawl
Scalability
Resiliency
denial-of-service attack
information management
Floods
distributed detection
LFA
Traceroute
Chained Attacks
1
2
3
4
5
6
7
next ›
last »