Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Educational institutions
biblio
Information Security Policy Perceived Compliance Among Staff in Palestine Universities: An Empirical Pilot Study
Submitted by grigby1 on Tue, 01/21/2020 - 10:23am
planned behaviour theory
Instruments
ISP
Least squares approximations
Mathematical model
Metrics
organisational aspects
Palestine university staffs
partial least squares structural equation modelling
Personnel
insider threat
PLS-SEM
policy-based governance
protection motivation theory
pubcrawl
resilience
Resiliency
security of data
statistical analysis
General Deterrence Theory
appraisal
Bibliographies
collaboration
Communications technology
compliance behaviour
data collection method
Educational institutions
employees
Security Policies Analysis
government policies
Human behavior
Human Factors
information reinforcement theory
information security
information security policy
Information Security Policy Awareness
information security risks mitigation
biblio
eAssessment by Using a Trustworthy System in Blended and Online Institutions
Submitted by grigby1 on Fri, 02/08/2019 - 3:36pm
keystroke dynamics
voice recognition
Trustworthy Systems
trustworthy system
trustworthiness
trust-driven solutions
TeSLA system
Technology-enhanced learning
Task Analysis
Speech recognition
Resiliency
resilience
pubcrawl
Plagiarism
online learning
online evaluation
assessment tasks
internet
Instruments
innovative solution
further education
Fingerprint recognition
face recognition
Educational institutions
eAssessment
cyber physical systems
computer aided instruction
composability
challenging problems
blended-learning
blended university
authentication
biblio
Block Level Streaming Based Alternative Approach for Serving a Large Number of Workstations Securely and Uniformly
Submitted by aekwall on Wed, 01/16/2019 - 1:08pm
scratchpad volatile memory
client workstation
client-server systems
Educational institutions
large number of clients
open source
Open Source solution
operating system
public domain software
client computer
security privacy constraints
University of Texas
user workstation security
virtualized computing
Windows clients
workstation configuration
Workstations
Windows Operating System Security
Servers
security
pubcrawl
Metrics
Resiliency
composability
Streaming media
Protocols
computer network security
data privacy
Linux
applications on-demand
Blades
block level streaming
campus computing
campus setting
Central Processing Unit
biblio
Bandwidth Prediction on a WiMAX Network
Submitted by el_wehby on Fri, 05/25/2018 - 2:49pm
Mobile communication
wireless
WiMAX network
WiMax
RSSI
receive signal strength indicator
prediction
next-generation networking technology
next generation networks
Bandwidth
IEEE 802.16 standard
IEEE 802.11 Standards
high-speed network access
Educational institutions
Correlation
CINR
carrier to interference plus noise ratio
bandwidth prediction
1536086
biblio
Ambiguity as a Barrier to Information Security Policy Compliance: A Content Analysis
Submitted by grigby1 on Mon, 11/20/2017 - 11:25am
Natural languages
Usable Security
text analysis
South Africa
Software
Security policy compliance
security policies
security of data
pubcrawl
policy-based governance
Policy human aspects
Policy clarity
Policy ambiguity
Policy
collaboration
institutional information resources
InfoSec policy document
Information services
information security policy compliance
information security
Guidelines
Government
Governance
Educational institutions
educational institution
education
Content analysis
biblio
GIS mapping and spatial analysis of cybersecurity attacks on a florida university
Submitted by grigby1 on Tue, 03/07/2017 - 12:40pm
geographic Internet protocol software
visualization
US universities
University of North Florida
statistical models
statistical analysis
spatial statistics
spatial point pattern analysis
Spatial analysis
Software
security of data
R software
pubcrawl170109
point pattern analysis
Grippers
GIS mapping
advanced spatial statistical analysis functions
geographic information systems
Geographic Information System (GIS)
GEO-IP software
exploratory spatial data analysis
Educational institutions
educational administrative data processing
Data visualization
data visualisation
data analysis
cybersecurity threat detection software
cybersecurity attacks
Cybersecurity
cyberattack
cyber-attack detection
Computer crime
biblio
"Analog to information converter based on random demodulation"
Submitted by grigby1 on Tue, 02/21/2017 - 12:00pm
information theory
TIQ comparator
Shannon theorem
sampling rate
random demodulation
pubcrawl170104
Power dissipation
power consumption
Nyquist theorem
Mixers
low-pass filters
low-pass filter
low dynamic range
linear feedback shift register
ADC
high power consumption
gilbert cell mixer
Educational institutions
Demodulation
computer architecture
compressive sensing technique
compressive sensing
compressed sensing
analogue-digital conversion
Analog-digital conversion
analog to information converter
analog to digital converters
biblio
A Lifecycle Based Approach for Malware Analysis
Submitted by BrandonB on Wed, 05/06/2015 - 1:58pm
malicious outbound propagation
Zero day attack
spontaneous attack
specification-based detection
signature-based approach
Signature based
Reconnaissance
Polymorphic
peer coordination
network surveillance
Monitoring
Metamorphic
Malware Analysis
malware
anomaly based approach
local reconnaissance
lifecycle based approach
invasive software
inbound scan
inbound attack
hiding techniques
egg download
Educational institutions
device infection
Computers
client-side exploit
attack preparation
biblio
A unified sequential equivalence checking approach to verify high-level functionality and protocol specification implementations in RTL designs
Submitted by BrandonB on Wed, 05/06/2015 - 1:44pm
high level functionality verification
unified sequential equivalence checking approach
Sequential equivalence checking
sequence of states
RTL design verification
RTL design
Protocols
protocol specification implementation
Integrated circuit modeling
high-level models
high level synthesis
high level reference model
high level model
Abstracts
formal verification
formal technique
Formal Specification
electronic design automation
Educational institutions
design verification
design under verification
Data models
Computational modeling
computational margin
communication protocol
Calculators
biblio
Android #x0022;Health-Dr. #x0022; Application for Synchronous Information Sharing
Submitted by BrandonB on Wed, 05/06/2015 - 1:16pm
middleware
Health-DR. Engineering
healthy environment
Insurance
Insurance acumen or actuary
insurance agent
IT environment
medical annals
Medical services
electronic health records
Mobile communication
mobile computing
patient affability
Patient flexibility
physician
professional authentications
synchronous information sharing
user authentication
bibliography
Alert mechanism
ambulatory appliances
Android (operating system)
Android Health-Dr
Androids
annals management
Annotations of records
authentication
affability management
client discovery
database transit
Databases
dispensary
doctor affability
Doctor Flexibility
e-health application
Educational institutions
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »