Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Companies
biblio
Fireasy: a tool to aid security policy modeling, translation and understanding firewall configuration
Submitted by aekwall on Fri, 01/13/2023 - 3:51pm
Metrics
Task Analysis
SPML2
security policies
security
Scalability
Resiliency
pubcrawl
PacketFilter
Companies
maintenance engineering
Information systems
Human Factors
Graphics
Firewalls (computing)
firewall rules visualization
Firewal
biblio
Cyber threat intelligence enabled automated attack incident response
Submitted by grigby1 on Fri, 01/13/2023 - 1:28pm
adaptive systems
information security
pubcrawl
resilience
Resiliency
Heuristic algorithms
Scalability
Companies
Prediction algorithms
cyber threat intelligence
Knowledge engineering
cyber security
Security Heuristics
artificial immune systems
automated incident response
biblio
AI Ethics and Data Privacy compliance
Submitted by grigby1 on Fri, 01/06/2023 - 4:10pm
pubcrawl
resilience
Resiliency
Scalability
privacy
Artificial Intelligence
History
Companies
Law
AI
Human Factors
ethics
Regulation
GDPR
non-ethics
biblio
Data Acquisition and extraction on mobile devices-A Review
Submitted by grigby1 on Fri, 01/06/2023 - 3:50pm
android
physical/logical data acquisition
In-System Programming
full disk encryption
File-Base encryption
Combination Firmware
chip-off
mobile device
Digital Forensics
Resiliency
android encryption
Systematics
encryption
Forensics
operating systems
resilience
Data mining
Companies
Scalability
performance evaluation
Metrics
Human behavior
pubcrawl
biblio
Vendor Cybersecurity Risk Assessment in an Autonomous Mobility Ecosystem
Submitted by grigby1 on Thu, 01/05/2023 - 5:39pm
pubcrawl
Metrics
Safety
Ecosystems
Companies
risk assessment
smart cities
supply chains
statistical analysis
navigation
supply chain risk assessment
autonomous mobility
sustainable smart city
vendor risk
biblio
Neutrosophic Data Analytic Hierarchy Process for Multi Criteria Decision Making: Applied to Supply Chain Risk Management
Submitted by grigby1 on Thu, 01/05/2023 - 5:38pm
risk management
pubcrawl
Metrics
Databases
Companies
Decision Making
data analysis
supply chains
reflection
supply chain risk assessment
Multi Criteria Decision Making
Neutrosophic Data Analytic Hierarchy Process
risk factors
supply chain risk management
biblio
A decision support system for evaluating the logistical risks in Supply chains based on RPN factors and multi criteria decision making approach
Submitted by grigby1 on Thu, 01/05/2023 - 5:38pm
risk management
pubcrawl
Metrics
Industries
Companies
Decision Making
supply chains
Fuzzy logic
TOPSIS
Decision support systems
supply chain management
supply chain risk assessment
Best-worst method
Moroccan automotive industry
supply chain risk management
biblio
Exploit Security Vulnerabilities by Penetration Testing
Submitted by aekwall on Tue, 12/20/2022 - 5:21pm
DoS
White Box Test
Penetration Testing
Hashcat
dark web
Black Box Test
White Box Security
Kali Linux
Companies
DDoS
security
composability
Resiliency
Metrics
pubcrawl
information technology
Conferences
Computer hacking
computer networks
biblio
Implementation of the Risk-based Approach Methodology in Information Security Management Systems
Submitted by grigby1 on Fri, 11/18/2022 - 2:06pm
Companies
Security Risk Management
ISO 31000
ISO 27001
Risk
quality management
Systematics
Management system
Production
ISO standards
information security
Standards organizations
Scalability
Resiliency
resilience
Metrics
Human Factors
Human behavior
pubcrawl
risk management
biblio
Spear Phishing Emails Detection Based on Machine Learning
Submitted by grigby1 on Wed, 10/12/2022 - 2:39pm
Companies
Conferences
feature extraction
Forwarding features
Human behavior
interpolation
KMSMOTE
machine learning
machine learning algorithms
Phishing
pubcrawl
Reputation features
spear phishing emails
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »