Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Companies
biblio
Trust and Security of Embedded Smart Devices in Advanced Logistics Systems
Submitted by grigby1 on Fri, 08/26/2022 - 10:57am
pubcrawl
Vehicle-to-grid
Trust and Security
Training
Technological innovation
Systems Integration
supply chains
supply chain risk assessment
security
Scalability
Risk Register
Resiliency
resilience
expert systems
Metrics
Industries
Hypersonics
Human behavior
Enterprise Resilience
embedded systems
electric vehicle charging
composability
Companies
Bidirectional Charging
privacy
biblio
Information Protection of International Students Based on Network Security
Submitted by grigby1 on Wed, 07/13/2022 - 1:16pm
International Students in China
security management
Scalability
Resiliency
resilience
pubcrawl
process control
policy governance
network security
Metrics
collaboration
information security
information protection
Human behavior
education
data privacy
cybersecurity education
cyber security
composability
Companies
biblio
Research on Intelligent Recognition and Tracking Technology of Sensitive Data for Electric Power Big Data
Submitted by grigby1 on Wed, 06/08/2022 - 1:54pm
Scalability
tracking technology
intelligent identification
electric power big data
classification and grading
mechatronics
intelligent data
Resiliency
automation
security
Power measurement
Probabilistic logic
Compositionality
Data Security
Companies
Big Data
resilience
pubcrawl
biblio
USB Flash Drives Forensic Analysis to Detect Crown Jewel Data Breach in PT. XYZ (Coffee Shop Retail - Case Study)
Submitted by grigby1 on Wed, 06/08/2022 - 10:20am
Universal Serial Bus
USB Flash Drives
retail
Recipe
Crown Jewel
Credit Card Data
credentials
forensic
Information filters
Imaging
intellectual property security
pubcrawl
Media
hashing
intellectual property
Data Breach
composability
Companies
Access Control
Resiliency
resilience
policy-based governance
biblio
Insider Threat Detection Using An Unsupervised Learning Method: COPOD
Submitted by grigby1 on Tue, 06/07/2022 - 11:07am
Human behavior
tree structure analysis
insider threat
Vegetation
Metrics
composability
Companies
Communication networks
policy-based governance
feature extraction
pubcrawl
Intrusion Detection
Insider Threat Detection
Anomaly Detection
Unsupervised Learning
Forestry
security
biblio
A Related work on secure event logs protection with user identity using privacy preservation for the cloud infrastructure
Submitted by grigby1 on Mon, 05/09/2022 - 4:35pm
computer architecture
Monitoring
pubcrawl
resilience
Resiliency
privacy
Companies
Migration
Cloud Security
Scalability
Informatics
cloud computing security
user privacy in the cloud
cloud infrastructure
identify as a service
biblio
A StackNet Based Model for Fraud Detection
Submitted by aekwall on Fri, 05/06/2022 - 12:56pm
Credit cards
expandability
Stacked
LightGBM
GradientBoosting
fraud detection
CatBoost
Forestry
information management
Measurement
network architecture
Random Forest
Companies
Compositionality
Resiliency
pubcrawl
Training
biblio
DeepFake Detection using a frame based approach involving CNN
Submitted by grigby1 on Mon, 04/25/2022 - 4:29pm
security
pubcrawl
Human Factors
resilience
Resiliency
Scalability
Companies
Metrics
visualization
convolutional neural networks
Color
distortion
Skin
DeepFake
biblio
An Analysis and Classification of Vulnerabilities in Web-Based Application Development
Submitted by grigby1 on Mon, 04/18/2022 - 2:37pm
application security
Companies
Complexity theory
Human behavior
Phase measurement
policy-based governance
pubcrawl
resilience
Resiliency
security
security weaknesses
Task Analysis
taxonomy
vulnerability classification
Web Application Security
Web application vulnerability
biblio
Verification of Cloud Security Policies
Submitted by grigby1 on Mon, 04/18/2022 - 10:53am
Security Policies Analysis
Access Control
authorization
Companies
metagraphs
policy modeling
policy verification
policy-based governance
process control
pubcrawl
Redundancy
rego
Scalability
security policies
Switches
tools
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »