Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Compliance
biblio
Designing Psychological Conflict Resolution Strategies for Autonomous Service Robots
Submitted by grigby1 on Fri, 02/17/2023 - 9:42am
Media
persuasive robots
human-robot cooperation
Robot Trust
Service robots
Compliance
acceptance
psychology
trust
pubcrawl
human computer interaction
virtual reality
Computers
Resiliency
resilience
Human Factors
Human behavior
biblio
A Novel Method for Trusted Audit and Compliance for Network Devices by Using Blockchain
Submitted by grigby1 on Fri, 01/13/2023 - 1:46pm
Firewalls (computing)
Security Audits
security
Scalability
resilience
pubcrawl
network security
network audit
Insurance
Human behavior
Router Systems Security
Databases
control systems
Compliance
Communications technology
blockchains
blockchain
Predictive Metrics
Resiliency
biblio
Zero Trust Validation: from Practice to Theory : An empirical research project to improve Zero Trust implementations
Submitted by grigby1 on Fri, 12/02/2022 - 11:10am
resilience
zero trust
validation
Time measurement
Software measurement
Software
security strategy
risk management
Resiliency
Acoustic Fingerprints
real-time systems
pubcrawl
Organizations
Insurance
Human Factors
Human behavior
composability
Compliance
biblio
Using the Theory of Interpersonal Behavior to Predict Information Security Policy Compliance
Submitted by grigby1 on Mon, 04/18/2022 - 10:52am
information theoretic security
Bibliographies
Compliance
Data protection
Government
government effectiveness
information security
information security policy (ISP)
policy-based governance
Predictive models
pubcrawl
Regulation
security policies
theory of interpersonal behavior (TIB)
biblio
Deletion-Compliance in the Absence of Privacy
Submitted by aekwall on Wed, 04/13/2022 - 10:19am
security
Data models
privacy
data privacy
pubcrawl
Scalability
Observers
data structures
Compliance
deletion
GDPR
history-independence
data deletion
biblio
NetBot - An Automated Router Hardening Solution for Small to Medium Enterprises
Submitted by aekwall on Mon, 03/14/2022 - 1:42pm
information security
Organizations
machine learning algorithms
network security
pubcrawl
Resiliency
Predictive Metrics
automation
Virtual private networks
Compliance
Hardening
Rollback
router
virtual environments
vulnerability fixing
Router Systems Security
biblio
Risk and Compliance in IoT- Health Data Propagation: A Security-Aware Provenance based Approach
Submitted by aekwall on Fri, 02/25/2022 - 10:45am
Provenance
Senior citizens
security services
security risks
security evidence
security
Resiliency
Regulation
real-time systems
pubcrawl
Security Risk Estimation
Protocols
Metrics
Internet of Things-Health
Insurance
Human behavior
estimation
data propagation
composability
Compliance
biblio
Security Requirement Prototyping with Hyperledger Composer for Drug Supply Chain: A Blockchain Application
Submitted by Katie Dey on Thu, 10/21/2021 - 11:46am
supply chain security
blockchain
prototyping
hyperledger composer
Compliance
biblio
Continuous Compliance
Submitted by aekwall on Mon, 03/22/2021 - 1:08pm
continuous compliance process
Open Source Software
Manuals
key length
SoC
PCI DSS
auditing source code
cloud data stores
compliance certificate
encryption audits
cryptographically unsafe algorithms
FedRAMP
Hard-coded credentials
large cloud-services company
lightweight verification tools
open-source software
pluggable type systems
source-code compliance requirement
Production
Cryptography
Data Security
data privacy
Resiliency
pubcrawl
Compliance
standards
tools
Cloud Computing
Industries
software engineering
public domain software
encryption
program diagnostics
program verification
Predictive Metrics
Compositionality
biblio
Issues and Trends in Information Security Policy Compliance
Submitted by grigby1 on Fri, 11/20/2020 - 2:26pm
ISP
threats
Standards organizations
Security Policies Analysis
security of data
security behaviour
pubcrawl
policy-based governance
Personnel
Organizations
organizational information security policies
Compliance
information security policy compliance
information security policy
information security management
information security incidents
information security
information leakage threats
information governance
information and communication technology
Industry 4.0
computer security
1
2
3
next ›
last »