Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Companies
biblio
An Effective Immersive Cyber Security Awareness Learning Platform for Businesses in the Hospitality Sector
Submitted by K_Hooper on Wed, 01/10/2018 - 10:11am
pubcrawl
Human Factors
immersive cyber security awareness learning platform
immersive systems
Industries
industry requirement
learning management system
paper-based training
Personnel
potential attackers
human factor
rapid digitalisation
Resiliency
secured interaction
security breaches
security of data
Systematic Requirement Engineering
threat analysis
Training
gamification elements
composability
computer games
computer science education
computer security
cyber-attacks
cyber security awareness
cyber security program
E-Learning
Gamification
Companies
Hospitality
hospitality businesses
hospitality employees
hospitality industry
hospitality sector
hotel industry
Human behavior
human error
biblio
Immediate Attribute Revocation in Decentralized Attribute-Based Encryption Access Control
Submitted by grigby1 on Thu, 12/28/2017 - 12:40pm
decentralized CP-ABE
Software Architecture
security scalability
security degradations
Scalability
revocation
pubcrawl
multi-authority architecture
Multi-authority
group sharing applications
flexible access policies
encryption
Access Control
decentralized attribute-based encryption access control
data confidentiality
Cryptography
cryptographic method
computer architecture
Companies
cloud environment
Cloud Computing
authorization
attribute-based encryption
attribute revocation
biblio
Detecting Covert Channels in FPS Online Games
Submitted by grigby1 on Tue, 12/12/2017 - 12:28pm
Companies
Compositionality
covert channels
encoding
Entropy
Games
Online Games
pubcrawl
Receivers
Resiliency
Scalability
Servers
Training
biblio
Insider Threats and Cryptographic Techniques in Secure Information Management
Submitted by grigby1 on Tue, 12/12/2017 - 12:24pm
Human behavior
unauthorized leakage
strategic data splitting
semantic analysis
secure information management
Resiliency
pubcrawl
Protocols
policy-based governance
Metrics
Insider Threats
information management security
information management
Human Factors
authorisation
enterprise management processes
Economics
data reconstruction methods
Data protection
data analysis
Cryptography
Cryptographic Protocols
cryptographic data splitting algorithms
Companies
collaboration
cognitive systems
cognitive data analysis
business data processing
biblio
A Collective, Probabilistic Approach to Schema Mapping
Submitted by grigby1 on Tue, 12/12/2017 - 12:19pm
metadata
uncertainty handling
schema mapping optimization problem
Scalability
Resiliency
pubcrawl
probability
probabilistic reasoning techniques
probabilistic reasoning
Probabilistic logic
optimization
metadata-only approaches
Metadata Discovery Problem
metadata constraints
CMD
meta data
mapping selection
inference mechanisms
data structures
Data mining
Data engineering
Conferences
Compositionality
Companies
collective probabilistic schema mapping approach
collective mapping discovery
cognition
biblio
Security of software defined networks: Taxonomic modeling, key components and open research area
Submitted by grigby1 on Mon, 11/20/2017 - 11:20am
Resiliency
network management
network operators
network specification
networking like routing
open research area
Policy
policy-based governance
program debugging
pubcrawl
low-level device configuration
SDN architectural layers-interfaces
SDN architecture
security solutions
simulation framework
software defined network security
software defined networking
state distribution
taxonomic modeling
thematic taxonomy
cyber-attacks
Artificial Neural Networks
Cloud Watcher
collaboration
Companies
computer architecture
Computer crime
computer network management
computer network security
control systems
artificial neural network
debugging
digital simulation
digital threats
FORTNOX
FRESCO
Governance
Government
Hardware
L-IDs
biblio
Vulnerability analysis related to extraordinary events in power systems
Submitted by grigby1 on Wed, 03/08/2017 - 1:30pm
power system faults
Vulnerability
security
risk analysis
Risk
pubcrawl170112
power system vulnerability
power system simulation
power system reliability
Companies
power system
Power supplies
operating states
Meteorology
fault diagnosis
Extraordinary events
emergency preparedness
critical contingencies
biblio
Cybersecurity for product lifecycle management a research roadmap
Submitted by grigby1 on Wed, 03/08/2017 - 1:30pm
encryption
three-dimensional printing
supply chain management
secure supply chains
secure collaboration techniques
research roadmap
remote 3D printing
pubcrawl170112
product lifecycle management
product life cycle management
PLM
insider threat
groupware
Access Control
embedded systems
DBSAFE
Data Security
Cybersecurity
critical protection techniques
computer security
compliance techniques
Companies
collaboration
authorisation
access control systems
biblio
Potential cyber-attacks against global oil supply chain
Submitted by grigby1 on Wed, 03/08/2017 - 1:28pm
Information Flow
threats to energy sector
Temperature sensors
supply chains
supply chain management
security of data
risk management
ripple effect
pubcrawl170112
petroleum industry
organization
organisational aspects
oil supply chain
information management
Companies
globalisation
global supply chain
global oil supply chain
global market
financial losses
Energy Sector
damaging effect
cyber-attacks countermeasures
cyber-attacks
cyber-attack
cyber risk assessment
Cyber incident
Computer hacking
biblio
Research on income distribution model of supply chain financing based on third-party trading platform
Submitted by grigby1 on Wed, 03/08/2017 - 1:26pm
industrial economics
third-party trading platform
supply chains
supply chain financing
Stability analysis
Shapley value
security
risk correction factors
risk analysis
remuneration
pubcrawl170112
AHP
income unequal distribution
income fluctuation
income distribution model
game theory
ethics
cooperative game
Companies
Banking
analytic hierarchy process
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »