Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Educational institutions
biblio
Automated Student Assessment for Cybersecurity Courses
Submitted by grigby1 on Wed, 11/04/2020 - 12:43pm
digital world
skills
security of data
pubcrawl
privacy
ethical hacking
educational technology
educational process
Educational institutions
educational courses
educational administrative data processing
adding automated grading
cybersecurity knowledge
cybersecurity educational technology
cybersecurity education
Cybersecurity
cyber physical systems
computer science education
computer aided instruction
automated student assessment
automated assessment
assessment functionality
biblio
Cybersecurity Associate Degree Program Curriculum
Submitted by grigby1 on Wed, 11/04/2020 - 12:43pm
knowledgeable level cybersecurity workforce
cybersecurity education programs
educational courses
Educational institutions
Force
global cybersecurity guide
Guidelines
higher education
Junior
cybersecurity education
privacy
professional field
pubcrawl
qualified cybersecurity workforce
security of data
student competency focused curriculum
Task Analysis
computer security
Accreditation
ACM CCECC
Associate Degree
associate degree cybersecurity programs
associate level cybersecurity workforce
community
community college educators
computer science education
& Technical College
CSEC2Y
curriculum
cyber physical systems
Cyber2yr
Cyber2yr work
Cybersecurity
cybersecurity associate degree program curriculum
biblio
Cybersecurity Education: From Beginners to Advanced Players in Cybersecurity Competitions
Submitted by grigby1 on Wed, 11/04/2020 - 12:43pm
security of data
learning needs
motivation
National Cyber League competition
novice players
player feedback
player interests
privacy
pubcrawl
Interviews
student engagement
systematic training
Systematics
Task Analysis
team game
tools
Training
undergraduate students
cybersecurity competition
advanced players
capture-the-flag type tasks
college-level cybersecurity competition
computer aided instruction
computer science education
computer security
confidence level
cyber physical systems
active learning
cybersecurity concepts
cybersecurity education
Educational institutions
Games
Human Factors
human-subject study
individual games
biblio
Assessing E-Security Behavior among Students in Higher Education
Submitted by aekwall on Mon, 10/12/2020 - 10:45am
behavior
Human Behavior and Cybersecurity
United Arab Emirates
Security Behavior Survey Instrument
password usage
online scam
higher educational institutions
higher education students
further education
e-security behavior assessment
E-security awareness
social engineering
Educational institutions
authorisation
data handling
Human Factors
Phishing
password
Cybersecurity
internet
Computer crime
pubcrawl
Human behavior
Electronic mail
invasive software
malware
biblio
XSStudent: Proposal to Avoid Cross-Site Scripting (XSS) Attacks in Universities
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
attack vector
Cross Site Scripting
XSStudent
URL
universities
phishing attacks
instant access
direct access
Cross-site Scripting Attacks
controlled attack
Beef software
BeEF
Scalability
Educational institutions
JavaScript code
XSS
QR code
Java
internet
Computer crime
pubcrawl
Human behavior
Resiliency
biblio
Brute-force and dictionary attack on hashed real-world passwords
Submitted by grigby1 on Fri, 09/04/2020 - 2:24pm
educational administrative data processing
brute force attacks
uncracked passwords
Slovenian university
password security
password creation policies
password cracking
online grading system
hybrid attacks
hashed real-world passwords
hashed passwords
Educational institutions
authorisation
Dictionaries
cracked passwords
Brute-force Attack
dictionary attack
information system
policy-based governance
Human Factors
password
Force
collaboration
pubcrawl
biblio
Intellectual Property Management in Serious Games
Submitted by grigby1 on Thu, 07/30/2020 - 1:05pm
patents
utility models
technology transfer strategies
Technology Transfer
serious games
research and development
public universities
Public National Universities
knowledge factories
Irrigation
intellectual property rights protection analysis
Educational institutions
intellectual property management
ip protection
Technological innovation
pubcrawl
serious games (computing)
computer aided instruction
intellectual property
Metrics
Games
composability
industrial property
Analytical models
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
biblio
Fully Secure Decentralized Key-Policy Attribute-Based Encryption
Submitted by grigby1 on Fri, 07/24/2020 - 11:32am
group theory
Zinc
standard model
Scalability
pubcrawl
private key encryption
private key cryptography
policy-based governance
monotonic access structure
LSSS
linear secret sharing scheme
KP-ABE scheme
KP-ABE
key policy attribute based encryption
Indexes
AA
global identifier
GID
Games
game theory
fully secure single-authority KP-ABE system
fully secure
encryption
Educational institutions
decentralized key-policy attribute-based encryption
decentralized
collaboration
central authority
CA
Attribute authority
biblio
Concept for network intrusion detection system based on recurrent neural network classifier
Submitted by aekwall on Mon, 05/11/2020 - 10:13am
Recurrent neural networks
technology school electronic systems
Technical University Sofia
recurrent neural network classifier
problem-based learning
network intrusion detection system
long-short term neural network
long-short term memory units
learning project
high-school student
Educational institutions
Apache HTTP Server
computer aided instruction
DoS
computer network security
recurrent neural nets
Logic gates
Web servers
Intrusion Detection
computer science education
network intrusion detection
Metrics
composability
pubcrawl
Resiliency
Monitoring
intrusion detection system
biblio
Privacy Protection Scheme in Smart Grid Using Rechargeable Battery
Submitted by grigby1 on Mon, 03/09/2020 - 1:57pm
Scalability
Metrics
policy-based governance
privacy
privacy protection scheme
pubcrawl
rechargeable battery
resilience
Resiliency
Information Leakage
secondary cells
Smart Grid
Smart Grid Privacy
Smart Grids
smart meters
smart power grids
statistical methods
user privacy
electrical power
automation
batteries
battery power information
collaboration
composability
data privacy
Educational institutions
electrical load information
Abstracts
Electronic mail
energy consumption
heuristic algorithm
home energy use information
home network
Human behavior
Human Factors
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »