Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Companies
biblio
Invited Paper: The Applications of Machine Learning in Privacy Notice and Choice
Submitted by grigby1 on Fri, 04/03/2020 - 11:34am
Privacy Policies
World Wide Web
user interactions
taxonomy
privacy stakeholders
privacy notice
privacy landscape
privacy awareness
online privacy practices
General Data Protection Regulation
privacy
Companies
Scalability
data privacy
Human behavior
pubcrawl
machine learning
Data collection
learning (artificial intelligence)
biblio
A new vehicular blackbox architecture based on searchable encryption
Submitted by grigby1 on Wed, 03/18/2020 - 11:15am
insurance company
resilience
Resiliency
composability
pubcrawl
vehicular context
vehicular blackbox architecture
vehicles
vehicle owner
searchable symmetric encryption
multiple use cases
law enforcement authorities
Cryptography
Companies
chain of custody
Blackbox system
Accidents
accident investigation
searchable encryption
security
Insurance
data privacy
encryption
biblio
The Actual Problems of IT-Security Process Assurance
Submitted by grigby1 on Mon, 03/02/2020 - 12:35pm
organisational aspects
Vulnerability
System recovery
Standard
security of data
security
risk management
Resiliency
resilience
pubcrawl
Production
asset
IT-security process assurance
IT-security management system
ISO standards
integrated management systems
Integrated Management System
information management
IEC standards
company business processes
Companies
business process
biblio
Virtual Network Mapping Algorithm for Self-Healing of Distribution Network
Submitted by grigby1 on Mon, 02/17/2020 - 4:15pm
survivability virtual network initial mapping method
power systems
pubcrawl
remapping efficiency
remapping method
resilience
Resiliency
self-healing
self-healing networks
power engineering computing
SVNE method
virtual links
virtual network
virtual network mapping algorithm
virtual nodes
virtualisation
VN initial mapping method
automation
power distribution reliability
physical node recoverability
optical fiber communication
node failure
network mapping
multinode failures
Linear programming
fault tolerant computing
distribution network
composability
Companies
Communication networks
backup resource-specific phenomenon
backup overhead
backup mechanism
biblio
Learning to Identify Security-Related Issues Using Convolutional Neural Networks
Submitted by aekwall on Mon, 02/10/2020 - 11:10am
open source issues
Semantics
user interfaces
agile development practices
aid development teams
CNN
high dimensional word embeddings
issue descriptions
Man-machine systems
natural language descriptions
security issues
robust security assurance
SDL
security-focused automation
security-related content
security-related requirements
software products
two-phase neural net architecture
vulnerability descriptions
software assurance
convolutional neural network
security
Kernel
computer architecture
learning (artificial intelligence)
pubcrawl
composability
deep learning
Databases
convolutional neural nets
security of data
Companies
ontologies (artificial intelligence)
Data mining
public domain software
software security
Scalability
software quality
Human Factors
biblio
Evaluating Features Selection on NSL-KDD Data-Set to Train a Support Vector Machine-Based Intrusion Detection System
Submitted by aekwall on Mon, 01/27/2020 - 9:20am
Measurement
support vector machine-based intrusion detection system
support vector machine model
NSL-KDD data-set
global information security
economic repercussions
DoS attacks
digital industry
data set
classification model
big companies
aforementioned data-set
Denial of Service attacks
Predictive Metrics
security of data
Intrusion Detection
Companies
cyber-attacks
support vector machine
machine learning
composability
pubcrawl
Resiliency
Feature Selection
feature extraction
Support vector machines
Data models
Kernel
biblio
Adoption of Lamport signature scheme to implement digital signatures in IoT
Submitted by aekwall on Mon, 01/06/2020 - 9:37am
embedded systems
Lamport signature scheme
Internet of Things technology
digital communication
quantum computing
Public key
digital signatures
Generators
firmware
computer network security
authentication
Companies
pubcrawl
Resiliency
IoT devices
Internet of Things
Cryptography
Scalability
biblio
Using Deterrence to Mitigate Employee Internet Abuse
Submitted by aekwall on Wed, 12/18/2019 - 1:38pm
company networks
Web activity
labour resources
internet abuse
ethics
ethical aspects
Employment
employee satisfaction
employee Internet abuse
company resources
Monitoring
AUP
acceptable use policies
Deterrence
resilience
Companies
internet
pubcrawl
Human behavior
Scalability
biblio
Securing IS assets through hacker deterrence: A case study
Submitted by aekwall on Wed, 12/18/2019 - 1:36pm
wireless networks
internal threat deterrence
information systems security
hacker deterrence
external threat deterrence
external computer criminals
e-commerce organization
cyber attack
broken windows theory
Deterrence
electronic commerce
Computer crime
Computers
Information systems
resilience
Companies
Computer hacking
pubcrawl
Human behavior
Scalability
computer network security
biblio
DDoS Mitigation: Decentralized CDN Using Private Blockchain
Submitted by aekwall on Wed, 12/18/2019 - 1:24pm
Bandwidth
public administration
private blockchain
military organizations
military agencies
government agencies
distributed CDN Schema
Content Delivery Network(CDN)
content delivery network
CDN system
DDoS attack mitigation
resilience
contracts
military computing
Computer crime
Companies
internet
Metrics
composability
pubcrawl
Human behavior
Cryptography
Servers
IP networks
distributed denial of service attacks
ddos mitigation
computer network security
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »