Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information management
biblio
Incentive Contract for Cybersecurity Information Sharing Considering Monitoring Signals
Submitted by grigby1 on Wed, 03/18/2020 - 11:51am
Incentive Model
Science of Security
Human behavior
resilience
Resiliency
Metrics
Policy-Governed Secure Collaboration
collaboration
composability
pubcrawl
Moral Hazard
monitoring signals
Insurance
information sharing output
information management
security of data
Incentive mechanism
incentive contract
ethics
Environment monitoring
cybersecurity information sharing
cybersecurity information haring
cyber risk transfer
Cyber Insurance
contracts
computer security
Scalability
risk management
Monitoring
biblio
The Actual Problems of IT-Security Process Assurance
Submitted by grigby1 on Mon, 03/02/2020 - 1:35pm
organisational aspects
Vulnerability
System recovery
Standard
security of data
security
risk management
Resiliency
resilience
pubcrawl
Production
asset
IT-security process assurance
IT-security management system
ISO standards
integrated management systems
Integrated Management System
information management
IEC standards
company business processes
Companies
business process
biblio
Maritime Situational Awareness Forensics Tools for a Common Information Sharing Environment (CISE)
Submitted by grigby1 on Mon, 02/17/2020 - 5:17pm
National security
information management
integrated systems laboratory
ISL
learning (artificial intelligence)
marine engineering
maritime security
Maritime Surveillance
maritime surveillance systems
maritime traffic
Metrics
MS
Hellenic CISE
National Situational Picture Management system
NSPM system
pubcrawl
resilience
Resiliency
security of data
situational awareness
surveillance
time filtering
tools
corresponding national legacy systems
AIS
Artificial Intelligence
automatic identification system
C2I system
CISE
Command
command and control systems
common information sharing environment
composability
control
control-command-information system
AI
CY-CISE projects
Cypriot CISE
Databases
deep learning
Distributed CISE database
EU Member States
Europe
Forensics
forensics tools
fusion algorithms
biblio
A preliminary approach towards the trust issue in cloud manufacturing using grounded theory: Defining the problem domain
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
information management
Trusted Computing
trust topic
trust issue
trust
supply chains
structured literature review
pubcrawl
production engineering computing
noncommittal phase
manufacturing
integrative phase
Bibliographies
grounded theory method approach
grounded theory
Computing Theory and Trust
Compositionality
composability
collaboration
cloud manufacturing trust
cloud manufacturing
Cloud Computing
Buildings
forum
Call for Papers: ACM TAAS 2019
Submitted by willirn1 on Mon, 07/15/2019 - 2:47pm
Call for Papers
ACM Transactions on Autonomous and Adaptive Systems: Providing a Platform for Interdisciplinary Research on Autonomous and Adaptive Systems 2019
Editor-in-Chief Bashar Nuseibeh
The Open University, UK, & Lero, Ireland
Calls for Papers
Communication
Systems Engineering
nature-inspired techniques
learning and prediction
social analysis
data management
information management
cooperative systems
urban computing systems
Swarm Intelligence
multi-agent systems
Autonomic computing
Adaptive Autonomy
autonomous adaptive control
cyberphysical systems
autonomic communications
Announcement
biblio
Binding the Physical and Cyber Worlds: A Blockchain Approach for Cargo Supply Chain Security Enhancement
Submitted by aekwall on Mon, 04/01/2019 - 10:04am
international trade
U.S.
Transportation
terrorist attacks
Terrorism
supply chains
supply chain stakeholders
supply chain management
security of data
security
securing cargo transportation
Public key
pubcrawl
physical cargo movements
maritime transportation
maritime cargo tracking system
binding scheme
Inspection
information management
illicit activities
goods distribution
globalisation
global economies
freight handling
digital identity management mechanism maps
cyber world
Companies
cargo supply chain security enhancement
cargo inspection
blockchain-based cargo management system
blockchain security
blockchain
biblio
Resilience of the Internet of Things (IoT) from an Information Assurance (IA) perspective
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
IoT socio-technical systems
Communities of Interest
computer architecture
Cyber defence
cyber security
digital economy
digital-enabled enterprises
functionality requirement
IA Architecture
Information Assurance
information management
internet
Internet infrastructure developments
Internet of Things
information sharing
Protocols
pubcrawl
resilience
Resiliency
Resilient Security Architectures
risk exposure
security
security of data
sociotechnical systems
STS
Trusted Computing
socio-technical systems
biblio
Insider Threats and Cryptographic Techniques in Secure Information Management
Submitted by grigby1 on Tue, 12/12/2017 - 1:24pm
Human behavior
unauthorized leakage
strategic data splitting
semantic analysis
secure information management
Resiliency
pubcrawl
Protocols
policy-based governance
Metrics
Insider Threats
information management security
information management
Human Factors
authorisation
enterprise management processes
Economics
data reconstruction methods
Data protection
data analysis
Cryptography
Cryptographic Protocols
cryptographic data splitting algorithms
Companies
collaboration
cognitive systems
cognitive data analysis
business data processing
biblio
The Design of Brand Cosmetics Anti-counterfeiting System Based on RFID Technology
Submitted by grigby1 on Wed, 03/08/2017 - 2:29pm
RFID technology
nonsecurity phenomena
product logistics information tracing
product logistics information tracking
production engineering computing
pubcrawl170112
Radiation detectors
radiofrequency identification
RFID (Radio Frequency Identification) technology
luxury cosmetics brand
sales methods
security
supply chain channels
supply chain management
supply chains
system-EPC system
visual information management system
analysis and design
information management
hard security phenomena
gray goods
false security phenomena
fake goods
distributed RFID tracking
digital authentication security technology
Databases
counterfeit goods
cosmetics brand distribution channels
cosmetics
cosmetic
brand cosmetics anticounterfeiting system
authentication
anticounterfeiting security system
biblio
Potential cyber-attacks against global oil supply chain
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
Information Flow
threats to energy sector
Temperature sensors
supply chains
supply chain management
security of data
risk management
ripple effect
pubcrawl170112
petroleum industry
organization
organisational aspects
oil supply chain
information management
Companies
globalisation
global supply chain
global oil supply chain
global market
financial losses
Energy Sector
damaging effect
cyber-attacks countermeasures
cyber-attacks
cyber-attack
cyber risk assessment
Cyber incident
Computer hacking
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »