Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
National security
biblio
Maritime Situational Awareness Forensics Tools for a Common Information Sharing Environment (CISE)
Submitted by grigby1 on Mon, 02/17/2020 - 5:17pm
National security
information management
integrated systems laboratory
ISL
learning (artificial intelligence)
marine engineering
maritime security
Maritime Surveillance
maritime surveillance systems
maritime traffic
Metrics
MS
Hellenic CISE
National Situational Picture Management system
NSPM system
pubcrawl
resilience
Resiliency
security of data
situational awareness
surveillance
time filtering
tools
corresponding national legacy systems
AIS
Artificial Intelligence
automatic identification system
C2I system
CISE
Command
command and control systems
common information sharing environment
composability
control
control-command-information system
AI
CY-CISE projects
Cypriot CISE
Databases
deep learning
Distributed CISE database
EU Member States
Europe
Forensics
forensics tools
fusion algorithms
biblio
Cyber-Physical Battlefield Platform for Large-Scale Cybersecurity Exercises
Submitted by grigby1 on Mon, 02/17/2020 - 5:04pm
physical facilities
large-scale CCE environment
large-scale cybersecurity exercises
low-level technical exercises
ltilevel organization network
military computing
national critical infrastructure protection
National security
National Security Research Institute
operational exercises
ICS/SCADA testbed
pubcrawl
real-time attack-defense battlefield drill
realistic ICS/SCADA exercise environment
red teams
SCADA systems
Scalability
security of data
security scalability
target cyber exercise format
cyber exercise
annual national exercise
augmented reality
blue teams
Compositionality
CPB platform
critical infrastructures
Cyber Attacks
cyber conflict
Cyber Conflict Exercise
actual ICS/SCADA systems
cyber security exercise environment
Cyber-physical battlefield platform
cyber-physical systems
cybersecurity exercise
exercise environments
exercise goals
exercise platform
high-level strategic exercise
biblio
An Empirical Study on the Data Security and Privacy Awareness to Use Health Care Wearable Devices
Submitted by aekwall on Mon, 02/17/2020 - 2:56pm
health care wearable devices
wearables security
structural equation analysis
security practice
security knowledge
security conduct
Security Awareness
security attitude
psychological effects
private businesses
privacy awareness
physical negative effects
personal health data
patient monitoring
multilayer medical resources
medical market
security of data
health applications
psychology
medical data
National security
privacy protection
user privacy protection
health care
Data protection
privacy
pubcrawl
Human behavior
Resiliency
Data Security
Scalability
biblio
Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators
Submitted by aekwall on Mon, 02/17/2020 - 2:33pm
IoC-centric cyber security sensor networks
design decisions
design principles
distributed cyber security sensor networks
effective cyber defence
exchange process
extensive human involvement
indicator distribution
information brokers
information exchange
cyber security sensor networks
national authorities
national cyber security
national cyber security centres
national cyber security sensor networks
scanning process
security data
security information
small-scale demonstrators
vital recommendations
composability
computer network security
Cryptography
Organizations
malware
Task Analysis
invasive software
Resiliency
Human behavior
pubcrawl
Computer crime
Metrics
Industries
Attack vectors
indicators of compromise
Feeds
sensor network
sensor security
National security
confidential indicators
biblio
Towards establishment of cyberspace deterrence strategy
Submitted by aekwall on Wed, 12/18/2019 - 2:37pm
civilian defense strategists
Weapons
strategy
social aspects of automation
National security
military security
first-strike
cyberspace deterrence strategy
cyberdeterrence
cyberattacks
credible declaratory retaliation capability
counter-strike
confidentiality
security of data
Deterrence
military computing
Cyberspace
resilience
Information systems
Availability
integrity
Economics
pubcrawl
Human behavior
Scalability
Computer crime
biblio
The National Security Challenges of Artificial Intelligence, Manipulated Media, and 'Deepfakes'
Submitted by willirn1 on Wed, 09/11/2019 - 10:19am
Articles of Interest
Artificial Intelligence
C3E 2019
Cognitive Security
Cognitive Security in Cyber
Deepfakes
National security
Cognitive Security
Articles of Interest
C3E 2019
biblio
Managing Big Data in Visual Retrieval Systems for DHS Applications: Combining Fourier Descriptors and Metric Space Indexing
Submitted by grigby1 on Fri, 03/22/2019 - 12:59pm
Shape
metric-based balanced indexing tree
Metrics
National security
Performance Metrics
pubcrawl
resilience
Resiliency
rifle database
Scalability
metric space indexing
Shape Signatures
Similarity Indexing Methods
tree data structures
visual databases
visual retrieval systems
visualization
weapon images
Weapons
feature representation
Balanced Trees
Big Data
big data security
content-based retrieval
database indexing
Department of Homeland Security
DHS applications
feature extraction
balanced search
Fourier descriptors
gun database
image retrieval
image retrieval systems
indexing
invariance properties
M-tree
Measurement
biblio
The ODNI-OUSD(I) Xpress Challenge: An Experimental Application of Artificial Intelligence Techniques to National Security Decision Support
Submitted by grigby1 on Fri, 02/08/2019 - 4:14pm
Decision support systems
artificial intelligence security
warfighters
US Intelligence Community
unstructured text
summarization
sensemaking
public prize challenge
public administration
policymakers
ODNI-OUSD(I) xpress challenge
national security decision support
National security
machine analytics
intelligence community
pubcrawl
decision support
artificial intelligence techniques
analytic product
natural language processing
uncertainty
Government
Artificial Intelligence
Task Analysis
integrated circuits
composability
Resiliency
Metrics
Human behavior
biblio
Analysis of Identity and Access Management alternatives for a multinational information-sharing environment
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
Linear programming
US Department of Defense
technological solutions
technical factor
systems engineering
Scalability
Resiliency
Reliability
pubcrawl
political factors
operational factor
National security
multinational information sharing environment
military computing
military communication
access management alternative
Joint Information Environment
Identity management
identity and access management technologies
Identity and Access Management
identity analysis alternative
Human behavior
Governance protocols
Economics
economic factor
Cybersecurity
computer security
authorization
authorisation
Australia
biblio
Semantic Information Fusion to Enhance Situational Awareness in Surveillance Scenarios
Submitted by grigby1 on Tue, 02/06/2018 - 2:04pm
inference mechanisms
Network reconnaissance
National security
military computing
military applications
Markov processes
Markov logic network
logical reasoning
knowledge model
ISR-AA
intelligence-surveillance-and-reconnaissance analytics architecture
information integration
Object oriented modeling
high-level data fusion component
enhanced situational awareness
Databases
Data mining
Data integration
critical events detection
cognition
civil protection
autonomous aerial vehicles
aerospace computing
Resiliency
Unmanned Aircraft Systems
UAS
surveillance scenarios
surveillance
situational picture
situational awareness
sensor fusion
sensor data
semantic information fusion
security forces
video surveillance
reasoning component
pubcrawl
probabilistic reasoning
Probabilistic logic
probabilistic information processing
OOWM
Ontology
ontologies (artificial intelligence)
object-oriented world model
object-oriented methods
« first
‹ previous
1
2
3
next ›
last »