Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Compliance
biblio
Automated Security Configuration Checklist for Apple iOS Devices Using SCAP v1.2
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
patch management
Vulnerability
tools
Standards organizations
security-related configuration settings
security of data
security content automation protocol
security configurations monitoring
security baseline
security automation
SCAP
Resiliency
pubcrawl
policy compliance
Apple iOS
Organizations
organization
Monitoring
Metrics
iOS Security
iOS (operating system)
information security management tasks
Human Factors
Compositionality
Compliance
automation
automated security configuration checklist
Apple iOS device configuration
biblio
Framework for Trustworthy Software Development
Submitted by aekwall on Mon, 04/13/2020 - 10:20am
auditability
Trustworthy Systems
trustworthy software development
trustworthy software
transparency
total product life cycle
smart advisors
process level
intelligent software applications
governance framework
Governance
bias-free
security of data
application development life cycle
algorithmic level
cyber physical systems
ubiquitous computing
trustworthiness
software engineering
Provenance
Compliance
composability
pubcrawl
Resiliency
biblio
Security-Related Stress: A Perspective on Information Security Risk Management
Submitted by aekwall on Mon, 02/17/2020 - 2:28pm
information security
stress inhibitors
security-related stress
security-novice practitioners
novices
ISRM tools
Information Security Risk Management
Security Risk Management
Management
security standards
security of data
Stress
risk management
tools
standards
Compliance
Metrics
pubcrawl
Resiliency
Scalability
biblio
Security Requirement Prototyping with Hyperledger Composer for Drug Supply Chain: A Blockchain Application
Submitted by grigby1 on Mon, 01/27/2020 - 12:34pm
blockchain
collaboration
Compliance
composability
Human behavior
Human Factors
hyperledger composer
Metrics
policy-based governance
prototyping
pubcrawl
resilience
Resiliency
Scalability
supply chain risk assessment
supply chain security
biblio
Ensuring Compliance of IoT Devices with Their Privacy Policy Agreement
Submitted by aekwall on Mon, 11/11/2019 - 11:48am
IoT privacy policy agreement
test equipment
test bed
smart phones
smart phone
security of data
security
Scalability
pubcrawl
privacy policy agreement
Privacy Policies
privacy
policy test bed
mobile computing
Cloud Computing
IoT privacy policy
IoT policy
IoT manufacturers
IoT devices
Internet of Things devices
Internet of Things
Informatics
Human behavior
GDPR
data privacy
computer science
Compliance
biblio
Research on Trust Degree Model of Fault Alarms Based on Neural Network
Submitted by grigby1 on Mon, 08/05/2019 - 11:35am
reliance
human trust
neural nets
neural network
Neurons
operator factors
policy-based governance
pubcrawl
Reliability
human machine system
resilience
Resiliency
Scalability
security of data
situational factors
Training
trust degree model
Databases
alarm system
Alarm systems
available experimental studies
Biological neural networks
collaboration
Compliance
computerised instrumentation
data base
alarm errors
Decision Making
false alarm rate
false trust
fault alarms
fault diagnosis
Human behavior
Human Factors
biblio
Regulatory Supervision with Computational Audit in International Supply Chains
Submitted by aekwall on Mon, 02/18/2019 - 12:53pm
Scalability
Resiliency
Human behavior
pubcrawl
audit
Compliance
process mining
regulatory supervision
supply chains
supply chain security
biblio
Review of IS Security Policy Compliance: Toward the Building Blocks of an IS Security Theory
Submitted by grigby1 on Mon, 04/30/2018 - 3:26pm
Compliance
information systems security
information systems security policy
insider threat
noncompliance
pubcrawl
review
security policies
biblio
An Evaluation of Constituency-based Hyponymy Extraction from Privacy Policies
Submitted by Jamie Presken on Tue, 07/11/2017 - 1:47pm
Compliance
hypernym
Hyponym
natural language processing
Ontology
Privacy Policy
biblio
Enterprise IoT Security and Scalability: How Unikernels Can Improve the Status Quo
Submitted by grigby1 on Mon, 05/22/2017 - 2:02pm
attack surface
big data privacy
big data security
cloud security and privacy
Compliance
pubcrawl
Scalability
security scalability
« first
‹ previous
1
2
3
next ›
last »