Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer crime
biblio
An Approach to Address Risk Management Challenges: Focused on IT Governance Framework
Submitted by aekwall on Fri, 01/13/2023 - 3:57pm
risk management
Security Risk Management
Strategic Alignment
Risk Management Model
risk assessment
IT Governance
IT Framework
Information systems
automation
resource management
Organizations
Resiliency
Metrics
Scalability
pubcrawl
resilience
information technology
Computer crime
Reliability
Human Factors
biblio
Critical Infrastructure Protection and Supply Chain Risk Management
Submitted by grigby1 on Thu, 01/05/2023 - 2:27pm
critical infrastructure
risk management
pubcrawl
resilience
Resiliency
Conferences
Computer crime
security requirements
Cybersecurity
requirements engineering
supply chains
Ransomware
Critical Infrastructure Protection
supply chain risk management
supply chain security
biblio
Detection of relevant digital evidence in the forensic timelines
Submitted by grigby1 on Fri, 12/23/2022 - 11:53am
Organizations
security
pubcrawl
Metrics
Resiliency
Computer crime
composability
operating systems
Digital Forensics
Windows Operating System Security
digital evidence
local outlier factor
File systems
Sequential analysis
digital forensic analysis
forensic timeline
biblio
Self-Protection for Unmanned Autonomous Vehicles (SP-UAV): Design Overview and Evaluation
Submitted by grigby1 on Fri, 12/09/2022 - 6:16pm
Complexity theory
unmanned autonomous vehicle
Self-protection
autonomous computing
Autonomic Security
Intrusion Response
surveillance
Observers
Transportation
computer architecture
Cybersecurity
composability
Computer crime
Medical services
Resiliency
resilience
pubcrawl
biblio
Zero trust: Never trust, always verify
Submitted by grigby1 on Fri, 12/02/2022 - 11:09am
no presumptive trust
zero trust
zero knowledge
trust
Scholarships
safe digital systems
Risk
Resiliency
resilience
pubcrawl
Acoustic Fingerprints
negative expectations
Human Factors
Human behavior
digital systems
data analysis
control
Computer crime
composability
biblio
Malware Detection and Security Analysis Capabilities in a Continuous Integration / Delivery Context Using Assemblyline
Submitted by grigby1 on Fri, 11/18/2022 - 2:49pm
Python
YARA
software analysis
PoetRAT
Malware Scoring
CI/CD
CCCS
Assemblyline
Security by Default
Ubuntu
detection
tools
malware
Computer crime
Scalability
Safety
Conferences
Resiliency
resilience
pubcrawl
security
risk management
biblio
Intelligent-Driven Adapting Defense Against the Client-Side DNS Cache Poisoning in the Cloud
Submitted by grigby1 on Thu, 10/20/2022 - 3:51pm
encryption
Cloud Computing
Servers
IP networks
pubcrawl
resilience
Computer crime
delays
Games
Cloud Security
Stochastic Computing Security
Resiliency
deep reinforcement learning
Stochastic game
client-side DNS cache poisoning attack
biblio
A Study on the Next Generation Security Control Model for Cyber Threat Detection in the Internet of Things (IoT) Environment
Submitted by aekwall on Fri, 09/30/2022 - 2:47pm
Human behavior
Security Platforms
Integrated Security
Commercialization
cyber threat
process control
IoT security
Market research
composability
security
Resiliency
Metrics
pubcrawl
standardization
Computer crime
Internet of Things
IoT
biblio
PUF-based IoT Device Authentication Scheme on IoT Open Platform
Submitted by aekwall on Fri, 09/30/2022 - 2:46pm
Human behavior
OCF Iotivity
device authentication
PUF
Physical Unclonable Function
information and communication technology
IoT security
standards
composability
security
Resiliency
Metrics
pubcrawl
Computer crime
authentication
Internet of Things
IoT
biblio
A workflow and toolchain proposal for analyzing users’ perceptions in cyber threat intelligence sharing platforms
Submitted by grigby1 on Fri, 09/30/2022 - 1:31pm
tools
Training
pubcrawl
Human behavior
Conferences
Analytical models
Computer crime
Proposals
Cybersecurity
information management
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »