Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Deterrence
biblio
Cyber deterrence in times of cyber anarchy - evaluating the divergences in U.S. and Chinese strategic thinking
Submitted by aekwall on Wed, 12/18/2019 - 1:37pm
Human behavior
war-fighting
US Department of Defense
U.S. strategic thinking
U.S. government
strategic cultures
Sino-U.S. cyber interactions
security of data
Scalability
resilience
pubcrawl
programmable logic arrays
People’s Liberation Army
national contexts
Instruments
Beijing
Economics
Deterrence
Cyberspace
cyber warfare
cyber threats
cyber strategy
cyber domain
cyber deterrence
cyber conflict
Cyber Attacks
cyber anarchy
Context
Chinese strategic thinking
China
biblio
Cyber – Transparencies, Assurance and Deterrence
Submitted by aekwall on Wed, 12/18/2019 - 1:36pm
safe-to-fail ecology
cyber-deterrence
cyber-ecology
cyber-scape
cyber-sûréte
deterrence-escalator
Ecology
fail-safe supervisory control and data acquisition system
influence
CSI
social trusts
socio-info-techno
state-based threat analysis
technological controls
threat equation
transparencies
trusts
warning time
Deterrence
Scalability
Trusted Computing
SCADA
Human behavior
pubcrawl
ontologies (artificial intelligence)
Ontology
resilience
security of data
collaboration by social influence
collaborative influence
conceptual-design paper
control
coordination by rule and control
CRC
cross disciplinary research strands
biblio
Take the rein of cyber deterrence
Submitted by aekwall on Wed, 12/18/2019 - 1:36pm
escalation control
uncertainty
surprising effect
security of data
Scalability
resilience
pubcrawl
learning (artificial intelligence)
Law
Human behavior
Complexity theory
employment law
Economics
dynamic retaliation
deterrence strategies
Deterrence
Cyberspace
cyber domain
cyber deterrence
cyber conflicts
biblio
Securing IS assets through hacker deterrence: A case study
Submitted by aekwall on Wed, 12/18/2019 - 1:36pm
wireless networks
internal threat deterrence
information systems security
hacker deterrence
external threat deterrence
external computer criminals
e-commerce organization
cyber attack
broken windows theory
Deterrence
electronic commerce
Computer crime
Computers
Information systems
resilience
Companies
Computer hacking
pubcrawl
Human behavior
Scalability
computer network security
biblio
The cyber deterrence problem
Submitted by aekwall on Wed, 12/18/2019 - 1:36pm
Decision Making
strategic assets
state actors
rational deterrence theory
Punishment
Presses
Nuclear weapons
missiles
leverage relevant examples
hackers
digital tools
digital age
deterrence frameworks
Deterrence
denial
Scalability
cyber deterrence problem
cyber
cultural aspects
cross-domain signaling
Credibility
cognitive theories
adept hackers
Cyberspace
resilience
tools
Computer crime
pubcrawl
Human behavior
biblio
A Framework for Making Effective Responses to Cyberattacks
Submitted by aekwall on Mon, 03/04/2019 - 9:46am
attribution confidence
USG
U.S. government
suspected attacker
Risk
Response
private sector
policymakers
national intelligence community
Market research
Government
Escalation
effective response decision
Deterrence
decision makers
cyberattack
analysis
attribution
Companies
Decision Making
Computer hacking
Metrics
composability
pubcrawl
Human behavior
Big Data
human-in-the-loop security center paradigm
Computer crime
security of data
biblio
Breaking and Fixing the HB+DB Protocol
Submitted by grigby1 on Wed, 09/12/2018 - 10:26am
Deterrence
distance-bounding
Human behavior
Human Factors
lightweight authentication
pubcrawl
resilience
Resiliency
Scalability
biblio
Technological Interventions to Detect, Communicate and Deter Sexual Assault
Submitted by grigby1 on Wed, 09/12/2018 - 10:26am
resilience
pubcrawl
Human behavior
Scalability
Resiliency
Human Factors
high decibel sound
olfaction
personal safety devices
self-defense
sexual assault
unpleasant odor
wearables
Deterrence
biblio
Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control
Submitted by grigby1 on Wed, 09/12/2018 - 10:26am
Access Control
resilience
pubcrawl
Human behavior
Scalability
moving target defense
Resiliency
authorization
Human Factors
Attributes
mutated policies
Deterrence
biblio
An Ontological Framework for Determining the Repercussions of Retirement Actions Targeted at Complex Access Control Policies in Cloud Environments
Submitted by grigby1 on Wed, 09/12/2018 - 10:26am
resilience
security
pubcrawl
Human behavior
Scalability
Cloud Computing
Ontologies
Resiliency
Human Factors
Governance
OWL 2
Policies
Deterrence
« first
‹ previous
1
2
3
4
5
6
next ›
last »