Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
National security
biblio
Analytics for Smart Grid Cybersecurity
Submitted by grigby1 on Tue, 02/06/2018 - 12:34pm
pubcrawl
vulnerability mapping
text analytics
text analysis
system-wide level
system of systems
structured text model
smart power grids
Smart Grids
smart grid cybersecurity
security of data
Scalability
SCADA
risk assessments
aviation e-Iandscape
power system security
power engineering computing
NIST reports
National security
Metrics
linear text form
Human Factors
Human behavior
Electric Vehicles
cyber-physical systems
control point analysis
Computer crime
composability
biblio
A Modelling Framework for Managing Risk-Based Checkpoint Screening Systems with Two-Type Inspection Queues
Submitted by grigby1 on Wed, 03/08/2017 - 1:29pm
pubcrawl170112
two-type inspection queues
supply chains
Steady-state
Stability analysis
Selectee Lanes
security checkpoints
security checkpoint
security
risk-based checkpoint screening system management
risk level
queueing theory
Airports
optimization model
optimisation
Normal Lanes
National security
multi-server queue
mix-integer non-linear programming model
inspection queues
Inspection
delays
congestion
Biological system modeling
biblio
A new X-ray backscatter technology for aviation security applications
Submitted by grigby1 on Wed, 03/08/2017 - 1:24pm
suspicious object detection
non-intrusive imaging
object detection
one-sided access method
packet parcel
pubcrawl170112
security applications
sensor arrays
supply chain security
National security
threat detection accuracy
twisted-slit collimator
X-ray backscatter camera
X-ray backscatter image enhancement
X-ray backscatter imaging
X-ray backscatter technology
X-ray detection
X-ray imaging
digital radiography
Airports
aviation security applications
avionics
backscatter
Cameras
collimators
detection of dangerous materials
Detectors
air safety
explosive detection
explosive simulants
high-resolution digital detector arrays
Inspection
luggage
luggage inspection
mock-up dangerous materials
biblio
A proven method for identifying security gaps in international postal and transportation critical infrastructure
Submitted by grigby1 on Wed, 03/08/2017 - 1:24pm
supply chain management
resilince management
risk analysis
security
security gap identification
security risk mitigation
shipping processing facilities
ships
Standards organizations
pubcrawl170112
surface to-air missile system
Transportation
transportation critical infrastructure security
transportation processing facilities
United States Postal Inspection Service
UPU standards
USPIS
worldwide commerce
international scale
critical transportation services
field instrument
global supply chain
Inspection
Instruments
international community
international mail processing centers
international postal infrastructure
critical infrastructures
military aircraft
missiles
National security
Organizations
physical security
physical security assessment method
Postal services
biblio
Studies of Integration Readiness Levels: Case Shared Maritime Situational Awareness System
Submitted by BrandonB on Tue, 05/05/2015 - 11:41am
IRL metrics
Systems engineering and theory
surveillance
situational awareness
sharing mechanisms
shared maritime situational awareness system
risk assessment
risk analysis
pre-operational validation
operational validation
National security
Measurement
maturity
border control information interactions
Interviews
integration readiness levels
integration readiness level metrics
integration
Information systems
information system integration
Finnish national border control domains
European border control domains
control systems
Context
Buildings
border control information systems
biblio
Fusing Open Source Intelligence and Handheld Situational Awareness: Benghazi Case Study
Submitted by BrandonB on Tue, 05/05/2015 - 11:31am
open source intelligence information
US Diplomatic mission
ubiquitous computing
Twitter data
Twitter
table top exercise
social networking (online)
social media streaming
social media
situational awareness
real-time systems
real time processing
Prototypes
prototype capabilities
Personnel
OSINT information
Benghazi case study
open source intelligence
National security
Media
Libya
information sharing
History
historical analysis
events attack
edge operators
contingency operations
context computing
context aware handheld situational awareness framework
Context
command and control systems
biblio
Presentation 9. Attribute assurance for attribute based access control
Submitted by BrandonB on Mon, 05/04/2015 - 1:52pm
Communities
subject attributes
open systems
object attributes
NIST
National security
LOAA
level of attribute assurance
interoperability
Intelligence Community Policy Guidance
ICPG
environmental attributes
Educational institutions
Department of Defense and Intelligence Community
critical assets protection
attribute retrieval
authorisation
attribute-based authorization
attribute update
attribute based access control
attribute confidentiality
attribute integrity
ABAC
Access Control
access management
AP
attribute assurance
attribute provider
attribute repositories
biblio
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Submitted by rvmeush on Fri, 09/26/2014 - 12:04pm
Anomaly Detection
computer science
computer security
Computerized monitoring
Guidelines
Intrusion Detection
Laboratories
machine learning
National security
network security
privacy
telecommunication traffic
« first
‹ previous
1
2
3