Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cybersecurity
biblio
Contactless Smart Card Experiments in a Cybersecurity Course
Submitted by grigby1 on Wed, 11/04/2020 - 12:59pm
educational courses
student feedback
smart cards
security of data
radiofrequency identification
pubcrawl
privacy
junior students
integrated circuits
experimental teaching
Access Control
education
cybersecurity education
cybersecurity course
Cybersecurity
cyber physical systems
contactless smart cards
computer security
computer science education
computer aided instruction
biblio
Digital Simulation in the Virtual World: Its Effect in the Knowledge and Attitude of Students Towards Cybersecurity
Submitted by grigby1 on Wed, 11/04/2020 - 12:45pm
text-based environment
password usage
Phishing
privacy
pubcrawl
social engineering
student experience
teaching
text analysis
password
user experience
Virtual Learning Environment
Virtual Learning Environments
virtual reality
virtual world
virtual world lessons
VLE
Digital Simulations
Computer crime
computer science education
cyber physical systems
Cybersecurity
cybersecurity attitude
cybersecurity education
cybersecurity knowledge
digital simulation
computer aided instruction
E-Learning
education
Educational institutions
Instruments
invasive software
malware
online scam
biblio
An Example of a Cybersecurity Education Model
Submitted by grigby1 on Wed, 11/04/2020 - 12:44pm
experts
security of data
pubcrawl
privacy
information technology perspective
information technology
Information systems
higher education training
further education
competencies
education
cybersecurity education model
cybersecurity education
Cybersecurity
cyber physical systems
curriculum
computer aided instruction
biblio
Development of Training System and Practice Contents for Cybersecurity Education
Submitted by grigby1 on Wed, 11/04/2020 - 12:44pm
further education
virtual computer environment
training system development
security personnel
security of data
security fields
pubcrawl
privacy
practice contents
human resource development
higher education institutions
commercial training system
exercise system
Educational institutions
education
defense exercise program
CyExec
cybersecurity exercise system
cybersecurity education
Cybersecurity
cyber physical systems
computer science education
biblio
Automated Student Assessment for Cybersecurity Courses
Submitted by grigby1 on Wed, 11/04/2020 - 12:43pm
digital world
skills
security of data
pubcrawl
privacy
ethical hacking
educational technology
educational process
Educational institutions
educational courses
educational administrative data processing
adding automated grading
cybersecurity knowledge
cybersecurity educational technology
cybersecurity education
Cybersecurity
cyber physical systems
computer science education
computer aided instruction
automated student assessment
automated assessment
assessment functionality
biblio
Cybersecurity Associate Degree Program Curriculum
Submitted by grigby1 on Wed, 11/04/2020 - 12:43pm
knowledgeable level cybersecurity workforce
cybersecurity education programs
educational courses
Educational institutions
Force
global cybersecurity guide
Guidelines
higher education
Junior
cybersecurity education
privacy
professional field
pubcrawl
qualified cybersecurity workforce
security of data
student competency focused curriculum
Task Analysis
computer security
Accreditation
ACM CCECC
Associate Degree
associate degree cybersecurity programs
associate level cybersecurity workforce
community
community college educators
computer science education
& Technical College
CSEC2Y
curriculum
cyber physical systems
Cyber2yr
Cyber2yr work
Cybersecurity
cybersecurity associate degree program curriculum
biblio
A Scaffolding Design Framework for Developing Secure Interoperability Components in Digital Manufacturing Platforms
Submitted by grigby1 on Mon, 11/02/2020 - 10:40am
program logic controllers
virtual open operating system
vf-OS security command centre
vf-OS IO toolkit generator
vf-OS IO components
system security
System Interoperability
software tools
software scaffolding
software applications
security of data
secure interoperability components
Scalability
scaffolding design framework
pubcrawl
programmable controllers
code generation technique
platform security
platform integration automation
operating systems (computers)
open systems
legacy file formats
i/o systems security
i-o systems security
human computer interaction
Fi-Ware
enterprise resource planning systems
enterprise resource planning
Digital manufacturing platforms
Cybersecurity
cyber-physical systems
Connected Smart Factories
biblio
A Cyber-Physical Interaction Model Based Impact Assessment of Cyberattacks for Internet of Vehicles
Submitted by aekwall on Mon, 10/19/2020 - 10:45am
Acceleration
IoV protection
IoV cyberattacks
intelligence traffic systems
impact assessment
economy development
cyberphysical interaction
cyber layer
attack impact
cyber physical systems
Internet of Vehicles
ITS
Intelligent Transportation Systems
National security
security of data
Human Factors
Physical layer
Mathematical model
Cybersecurity
Analytical models
Metrics
Roads
pubcrawl
Human behavior
Resiliency
cyber-physical systems
Internet of Things
Computer crime
biblio
Securing connection between IT and OT: the Fog Intrusion Detection System prospective
Submitted by grigby1 on Fri, 10/16/2020 - 10:32am
proprietary protocols
Internet of Things
Intrusion Detection
intrusion detection system
legacy systems
Monitoring
New Implementation Approaches
operational technology network
production engineering computing
information technology network
Protocols
pubcrawl
resilience
Resiliency
SCADA systems
Scalability
security of data
tools
fog intrusion detection system
Anomaly Detection
common signature based intrusion detection system
cyberattack
Cybersecurity
deep packet inspection
digital signatures
distributed processing
Fog computing
anomaly based features
ICs
industrial control
industrial control system
Industrial Control Systems
Industrial Informatics
Industrial Internet of Things
industrial IoT devices
biblio
Research on Governmental Data Sharing Based on Local Differential Privacy Approach
Submitted by grigby1 on Fri, 10/16/2020 - 10:24am
information sharing
statistical data
statistical analysis
sharing statistics
Resiliency
resilience
pubcrawl
private blockchain
Privacy-preserving
privacy protection models
privacy disclosure
privacy
policy-based governance
Peer-to-peer computing
local differential privacy
blockchain
information management
governmental departments
governmental data sharing
government information resources
government departments
government data processing
Government
e-government applications
E-Government
differential privacy
data sharing
data privacy
Cybersecurity
collaboration
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »