Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Companies
biblio
Keystroke Identifier Using Fuzzy Logic to Increase Password Security
Submitted by grigby1 on Mon, 03/29/2021 - 1:03pm
fuzzy systems
typing speed
security
secure log-in
Resiliency
resilience
pubcrawl
password security
password
normal password entry session
Metrics
message authentication
machine learning
keystroke identifier
authorisation
fuzzy system
Fuzzy logic
entity behavior analytics
delays
Delay effects
Cybersecurity
cybercriminal
Cybercrime
Cyber Physical System
correct password
computer security
Computer crime
Companies
biblio
Risks Identification in the Exploitation of a Geographically Distributed Cloud Infrastructure for Storing Personal Data
Submitted by grigby1 on Mon, 03/29/2021 - 12:14pm
Scalability
natural person
Object recognition
payment information records
personal data
personal data records
privacy
processing
pubcrawl
Risk
risk Identification
risk management
models
security
security of data
Servers
social engineering techniques
storage management
stored resources
storing personal data
system
Task Analysis
technical project
unsecured service
Data protection
augumented reality
Big Data
Cloud Computing
cloud services
cloud storage administrators
Companies
confidential information leaks
controller
cyber incidents
data leak
data privacy
auditing storage
data storage subsystem
data subject GDPR
digital twin
Distributed databases
expert systems
geographically distributed cloud infrastructure
geographically distributed company
high-loaded infocommunications systems
Human Factors
information quality
Kaspersky Lab
biblio
Design and Implementation of a Consensus Algorithm to build Zero Trust Model
Submitted by grigby1 on Thu, 03/04/2021 - 2:04pm
distributed systems
zero trust model
zero trust
trust model
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Human Factors
Acoustic Fingerprints
distributed ledger
Distributed databases
data transfer
Data Security
Consensus algorithm
Conferences
Companies
blockchain
biblio
Insider Threat Detection Using Natural Language Processing and Personality Profiles
Submitted by aekwall on Mon, 02/22/2021 - 12:39pm
Linguistics
third-party cloud service
psychological profiles
proof-of-concept detection system
personality profiles
personality insights
personal content
Insider Threats
taxonomy
psychology
Insider Threat Detection
natural language processing
computer security
Companies
pubcrawl
Human behavior
Resiliency
Scalability
Cloud Computing
security of data
biblio
The privacy paradigm : An overview of privacy in Business Analytics and Big Data
Submitted by grigby1 on Mon, 12/28/2020 - 11:37am
Big Data
Technology management
privacy paradigm
GPDR
data mining technologies
dados
business analytics
analytics
big data privacy
Google
Data protection
Companies
privacy
information technology
data privacy
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
business data processing
Data mining
data analysis
biblio
Decentralized Labor Record System Based on Wavelet Consensus Protocol
Submitted by grigby1 on Tue, 12/01/2020 - 1:01pm
Human behavior
wavelet consensus protocol
wavelet blockchain platform
Turing complete smart contracts platform
smart contracts
recruitment
pubcrawl
Portfolios
labour resources
labor record
labor market problems
job market
internet
human trust
blockchain
employment data
employment conditions
Employment
directed graphs
directed acyclic graph system
decentralized labor record system
contracts
consensus protocol
Companies
blockchain solutions
blockchain based system
blockchain based labor record systems
biblio
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes
Submitted by grigby1 on Fri, 11/20/2020 - 1:26pm
post-breach security
zero risk appetite
Task Analysis
security theatre
Security Policies Analysis
security policies
security of data
security division
security culture
security controls
security breach
security behaviour
pubcrawl
Productivity
post-breach security changes
Companies
policy-based governance
Personnel
participatory action research
organization security division
organisational aspects
Investment
Interviews
humble inquiry
financial investment
financial data processing
employees
Data Breach
data analysis
biblio
A New Security Approach in Telecom Infrastructures: The RESISTO Concept
Submitted by aekwall on Mon, 11/16/2020 - 1:57pm
Telecommunications
Resilient Security Architectures
telecom infrastructures
risk mitigation
RESISTO H2020 EU-funded project
holistic situation awareness
extreme weather events
criminal attacks
natural disasters
disasters
security approach
Communications
threats
security
resilience
5G mobile communication
Software Architecture
Government
Companies
vulnerabilities
pubcrawl
Resiliency
critical infrastructures
critical infrastructure
security of data
biblio
Contextual Factors Affecting Decisions About Intellectual Property Licensing Provisions in Collaboration Agreements for Open Innovation Projects of Complex Technological Organizations
Submitted by grigby1 on Mon, 11/02/2020 - 11:28am
open innovation
IP management capability
IP management strategies
IP networks
IP rights
joint product development
Licenses
licensing
open collaborative innovation strategies
open collaborative project
IP licensing terms
patents
policy-based governance
Procurement
pubcrawl
research collaboration
resilience
Resiliency
security of data
Technological innovation
critical IP access
collaboration agreements
collaborative research agreements
collaborative research project
collaborator IP
Companies
company-led research collaborations
composability
contextual factors
contracts
collaboration
industrial property
Industries
innovation management
intellectual property
intellectual property management
intellectual property security
IP access issues
IP licensing provisions
biblio
Industrial Control Intrusion Detection Model Based on S7 Protocol
Submitted by grigby1 on Fri, 10/16/2020 - 10:32am
S7 protocol
private industrial control protocols
production engineering computing
protocol analysis
protocol parsing technology
Protocols
pubcrawl
resilience
Resiliency
S7 data packet analysis
power systems
Scalability
Siemens Company
static white list configuration complexity
static white list configuration portability
tradtonal protocol parsing technology
Unsupervised Learning
white list detection
white list self-learning
white list self-learning algorithm
industrial control
abnormal S7 protocol packet detection
Anomaly Detection
communication process
Companies
composite intrusion detection method
computer network security
deep analysis algorithm
Heuristic algorithms
ICs
abnormal behavior detection
industrial control intrusion detection model
industrial control network security
industrial control system
Industrial Control Systems
internet
internet technology
Intrusion Detection
national Industrial 4.0 strategy
networked control systems
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »