Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Deterrence
biblio
Cyber Mutual Assured Destruction as a System of Systems and the Implications for System Design
Submitted by grigby1 on Fri, 07/03/2020 - 4:05pm
mutual assured destruction
systems analysis
system of systems
system design
security of data
Scalability
Resiliency
resilience
pubcrawl
cyber attack mutual assured destruction scenario
Human behavior
enemy attack
Deterrence
destructive capability
Cybersecurity
cyber warfare
cyber mutual assured destruction
biblio
A Fully Adaptive Lattice-based Notch Filter for Mitigation of Interference in GPS
Submitted by grigby1 on Fri, 07/03/2020 - 4:05pm
intentional interference
Signal to noise ratio
Scalability
Satellites
Resiliency
resilience
Receivers
pubcrawl
notch frequency
notch filters
notch filter structures
narrowband interference
Lattice-Based Notch Filter
Jamming
Interference
adaptive filters
Human behavior
GPS specific applications
GPS receivers
GPS modelling platform
Global Positioning System
Global Navigation Satellite Systems
fully adaptive lattice-based notch filter
direct form second order
Deterrence
Bandwidth
Anti-jamming
adaptive notch filtering
Adaptive Notch Filter
biblio
“Silent Battle” Goes Loud: Entering a New Era of State-Avowed Cyber Conflict
Submitted by grigby1 on Fri, 07/03/2020 - 4:05pm
pubcrawl
transparency
state-sponsored cyber attacks
state-avowed cyber conflict
security of data
Scalability
Salisbury poison attack
Russian GRU officers
Resiliency
resilience
public preparedness
attribution
politics
Netherlands intelligence services
NATO
Human behavior
EU nations
Deterrence
cyber policy
cyber conflict
cyber aggressor
biblio
A Cyber-Nuclear Deterrence Game
Submitted by grigby1 on Fri, 07/03/2020 - 11:43am
nuclear brinksmanship
strategic stability
standard game theoretic model
stabilizing destabilizing effects
Stability analysis
security of data
reliability theory
preemptive cyber attacks
opponent cyber capabilities
offensive cyber weaponry
Nuclear weapons
nuclear states
nuclear command
asymmetric cyber capabilities
information structure
incomplete information games
Games
game theory
Deterrence
cyberattack
cyber-nuclear deterrence game
cyber capabilities conflict
critical component
complete information game
Bayes methods
biblio
Rough-and-Ready: A Policy Framework to Determine if Cyber Deterrence is Working or Failing
Submitted by aekwall on Wed, 12/18/2019 - 1:39pm
adversary activity
United States policy
transparent framework
standard methodology
rough-and-ready metrics
policy framework
persistent engagement
intercept-and-halt adversary cyber operations
forward defense
cyber policy
Cyber Operations
adversary cyber operations
security of data
cyber conflict
cyber deterrence
Deterrence
resilience
threat intelligence
Cyber Attacks
Metrics
pubcrawl
Human behavior
Scalability
biblio
Developing an international cooperation on cyber defense and deterrence against Cyber terrorism
Submitted by aekwall on Wed, 12/18/2019 - 1:38pm
Terrorism
information technology security
government data processing
cyber security countermeasures
Cyber defence
social aspects of automation
cyber deterrence
Computers
cyber defense
cyber terrorism
security of data
Cyberspace
resilience
Government
Deterrence
internet
pubcrawl
Human behavior
Scalability
biblio
Using Deterrence to Mitigate Employee Internet Abuse
Submitted by aekwall on Wed, 12/18/2019 - 1:38pm
company networks
Web activity
labour resources
internet abuse
ethics
ethical aspects
Employment
employee satisfaction
employee Internet abuse
company resources
Monitoring
AUP
acceptable use policies
Deterrence
resilience
Companies
internet
pubcrawl
Human behavior
Scalability
biblio
The positive force of deterrence: Estimating the quantitative effects of target shifting
Submitted by aekwall on Wed, 12/18/2019 - 1:37pm
counter piracy
Terrorism
target shifting
stopping performance
Radiation detectors
low performance security
game theoretic approach
force multiplier
Force measurement
false alarm
deterrence force
counterterrorism
security of data
Deterrence
risk analysis
protection system
resilience
uncertainty
Force
pubcrawl
Human behavior
game theory
Scalability
biblio
Deterring Strategic Cyberattack
Submitted by aekwall on Wed, 12/18/2019 - 1:37pm
collateral damage control
nuclear regime
nuclear deterrence versus cyber deterrence
nuclear deterrence
legal norm
international agreement
government policies
cyberwar
cyberattack deterrence
cyber-dependent infrastructure
Critical Infrastructure Protection
comprehensive defense
security of data
Deterrence
Cyberspace
resilience
cyberattack
privacy
pubcrawl
Human behavior
critical infrastructures
cyber security
Scalability
Computer crime
biblio
Towards establishment of cyberspace deterrence strategy
Submitted by aekwall on Wed, 12/18/2019 - 1:37pm
civilian defense strategists
Weapons
strategy
social aspects of automation
National security
military security
first-strike
cyberspace deterrence strategy
cyberdeterrence
cyberattacks
credible declaratory retaliation capability
counter-strike
confidentiality
security of data
Deterrence
military computing
Cyberspace
resilience
Information systems
Availability
integrity
Economics
pubcrawl
Human behavior
Scalability
Computer crime
« first
‹ previous
1
2
3
4
5
6
next ›
last »