Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data collection
biblio
Auditable secure network overlays for multi-domain distributed applications
Submitted by grigby1 on Tue, 02/23/2021 - 2:23pm
Metrics
Virtual private networks
software stack
Resiliency
resilience
Public key
pubcrawl
Prototypes
overlay networks
overlay network
organisational boundaries
operational infrastructure
network accountability
multidomain overlay network
multidomain distributed applications
actionable contracts
marketplace
internet
digital data market place infrastructure
data sharing
Data processing
Data collection
Cryptography
contracts
computer network security
composability
communication fabric
auditing
auditable secure network overlays
actors
biblio
Security Visualization and Active Querying for OT Network
Submitted by grigby1 on Mon, 01/25/2021 - 11:28am
physical objects
intrusion prevention system
Metrics
Monitoring
network behavior
network inclusion
network security
operational technology network
OT Network
intrusion detection system
pubcrawl
real-time systems
resilience
Resiliency
security
Security Visualization
visualization
Workstations
cyber-attacks
Air gaps
air-gap
business network
comma separated value format
common event format
composability
computer network security
computer networks
active querying
Data collection
data visualisation
Data visualization
firewalls
Human behavior
Human Factors
internet
biblio
Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web
Submitted by grigby1 on Fri, 01/15/2021 - 12:22pm
dark web
Data Breach
Data collection
Human behavior
Human Factors
PII
privacy
pubcrawl
surface Web
biblio
Understanding Trust, Privacy and Financial Fears in Online Payment
Submitted by aekwall on Mon, 11/23/2020 - 11:38am
online payment decision
Human behavior
human trust
customer concerns
customer fears
customer satisfaction
financial fear perception
financial fears
financial loss
privacy loss
online purchasing environment
online seller
payment page
payment security perception
perceived payment security
purchasing
risk perception
website
trust
Conferences
security
Trusted Computing
pubcrawl
privacy
Web sites
consumer behaviour
uncertainty
data privacy
Data collection
Human Factors
electronic money
online transactions
Decision Making
financial data processing
e-commerce
online payment
biblio
Anomaly Detection Models for Smart Home Security
Submitted by aekwall on Mon, 11/23/2020 - 11:28am
HMM model
smart home environment
Compositionality
privacy violations
Hidden Markov models
hidden Markov model
anomalous activities
anomaly detection models
cyber threat surface
fire accidents
Smart Home
multiple sensors
network level sensor data
smart home security
smart homes devices
smart security cameras
smoke sensors
unauthorized movements
Intelligent Data Security
Intelligent Data and Security
Resiliency
Monitoring
Scalability
Big Data
data privacy
security
smart devices
DDoS Attacks
learning (artificial intelligence)
machine learning
computer network security
pubcrawl
Anomaly Detection
Energy Efficiency
Data collection
sensor fusion
Intelligent sensors
Smart homes
home automation
biblio
The World (of CTF) is Not Enough Data: Lessons Learned from a Cyber Deception Experiment
Submitted by aekwall on Mon, 10/12/2020 - 11:45am
experimental controls
traditional CTF events
Task Analysis
red team
pubcrawl
psychology
military computing
human performance
Human Factors
Human Behavior and Cybersecurity
Human behavior
human attacker
future cyber operations studies
capture the flag
deeply rooted human component
Data collection
cyber testing
cyber deception experiment
controlled human-subject experiment
computer-security-computer-networks-computer-hacking-cyber-defense-research-and-development-humans-testing-deception
computer security
Computer crime
Computer bugs
cognitive testing
cognition
biblio
Observation Measures to Profile User Security Behaviour
Submitted by aekwall on Mon, 10/12/2020 - 11:42am
Data collection
Human Behavior and Cybersecurity
user-system interactions
user security behaviour
User profile
user modelling
security behaviour profile
Observation Measures
interactive environment
cybersecurity threats
computer user security
behaviour profiling
Behaviour Profile
Human behavior
human computer interaction
computer security
pubcrawl
security of data
biblio
Privacy-Preserving Data Collection in Context-Aware Applications
Submitted by aekwall on Mon, 09/28/2020 - 11:54am
ubiquitous computing
Computing Theory and Privacy
user data privacy preservation
three-antithetic-party game
serious privacy issues
privacy-preserving data collection scheme
privacy leakage risk
data collection game
context-awareness
Context-aware services
context-aware applications
smart devices
game model
security of data
Numerical models
Games
Data collection
privacy
pubcrawl
Human behavior
Resiliency
game theory
privacy concerns
data privacy
Scalability
biblio
Data Collection from Privacy-Aware Users in the Presence of Social Learning
Submitted by aekwall on Mon, 09/21/2020 - 3:49pm
data collector
Control Theory and Privacy
symmetric randomized response strategy
state estimation accuracy
social learning
Social groups
private signal
privacy-preserving data
privacy-aware users
privacy cost
payment mechanism
noisy group signals
informative non-disclosive strategy
generalized majority voting rule
friends
elicited data
Scalability
Bayesian-Nash equilibrium
cyber physical systems
Silicon
Noise measurement
Data collection
cyber-physical systems
privacy
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
Data models
Bayes methods
game theory
data privacy
biblio
Securing smart grid data under key exposure and revocation in cloud computing
Submitted by grigby1 on Fri, 07/24/2020 - 12:50pm
key exposure
Data collection
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
advanced cipher text policy attribute
and smart grid
cloud supported IoT
encrypted key
encryption key
encryption process
enhancing system ability
revocation
obtaining security
security requirements
smart grid data security method
smart grid systems data
smart IoT devices
system failures
transmission process
collaboration
power engineering computing
Cryptography
encryption
Internet of Things
authorisation
Cloud Computing
data privacy
Servers
Scalability
Ciphers
power system security
Smart Grids
smart power grids
data owner
cloud server
pubcrawl
policy-based governance
CP-ABE
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »