Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Personnel
biblio
Cyber-Range Federation and Cyber-Security Games: A Gamification Scoring Model
Submitted by grigby1 on Wed, 07/13/2022 - 12:17pm
Personnel
Training
Topology
security training
security
Scoring model
Scalability
Resiliency
resilience
pubcrawl
policy governance
collaboration
Organizations
Metrics
Human behavior
Gamification
Federated platforms
cybersecurity education
Cyber-range
Conferences
Computer crime
composability
biblio
Scalable Learning Environments for Teaching Cybersecurity Hands-on
Submitted by grigby1 on Mon, 03/14/2022 - 11:17am
operating systems
sandbox
learning technology
interactive learning environment
educational data mining
cyber range
Personnel
cybersecurity education
Technological innovation
learning analytics
Training
Policy Based Governance
Portable computers
virtual machines
sandboxing
computer security
Data mining
composability
collaboration
pubcrawl
biblio
Delegated Authorization Framework for EHR Services using Attribute Based Encryption
Submitted by aekwall on Tue, 01/25/2022 - 2:52pm
Data Breach
Organizations
Data models
attribute-based encryption
authorization
encryption
pubcrawl
Scalability
Human behavior
policy-based governance
Cloud Computing
Personnel
attribute based encryption
electronic medical records
Ontologies
biblio
APT attack response system through AM-HIDS
Submitted by aekwall on Mon, 12/20/2021 - 11:23am
Companies
White List
Personnel
NIST
malicious
Anti
AM-HIDS
APT
advanced persistent threat
security
malware
Human behavior
Resiliency
Metrics
pubcrawl
Computer crime
Scalability
real-time systems
biblio
Behavior Modeling for Cybersecurity
Submitted by grigby1 on Tue, 03/30/2021 - 11:03am
behavior modeling
cyber security incidents
Cybersecurity
faulty code
Human behavior
human behaviors
human behaviour modeling
Human Factors
Personnel
pubcrawl
scanning devices
security
security of data
soft factors
software developers
system administrators
biblio
The Role of Individual Differences as Predictors of Trust in Autonomous Security Robots
Submitted by grigby1 on Wed, 02/03/2021 - 12:44pm
PAS
trust
security
robots
Robot Trust
Resiliency
resilience
Reliability
regression analysis
public reactions
pubcrawl
Personnel
perfect automation schema
ASR
Particle measurements
mobile robots
individual differences factors
individual differences
human-robot interaction
Human Factors
Human behavior
autonomous security robots
autonomous robots
automation
Atmospheric measurements
biblio
Modified Grey Wolf Optimization(GWO) based Accident Deterrence in Internet of Things (IoT) enabled Mining Industry
Submitted by aekwall on Mon, 01/11/2021 - 12:38pm
patient monitoring
occupational safety
occupational health
mining industry
mine workers
Introduction
industrial accidents
Heart rate
health conditions
accident deterrence
Accident
grey wolf optimization
grey systems
IoT
Deterrence
Personnel
computerised monitoring
optimisation
production engineering computing
pubcrawl
Human behavior
Resiliency
Internet of Things (IoT)
Internet of Things
Scalability
biblio
A Theoretical Review: Risk Mitigation Through Trusted Human Framework for Insider Threats
Submitted by grigby1 on Tue, 12/01/2020 - 12:59pm
Personnel
trusted human framework
Trusted Computing
software engineering
security of data
risk mitigation
risk management
pubcrawl
potential employees
cyclic process
People Process and Technology
on-going process
insider threats risk
Insider Threats
human trust
Human behavior
enterprise risk management activities
biblio
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes
Submitted by grigby1 on Fri, 11/20/2020 - 1:26pm
post-breach security
zero risk appetite
Task Analysis
security theatre
Security Policies Analysis
security policies
security of data
security division
security culture
security controls
security breach
security behaviour
pubcrawl
Productivity
post-breach security changes
Companies
policy-based governance
Personnel
participatory action research
organization security division
organisational aspects
Investment
Interviews
humble inquiry
financial investment
financial data processing
employees
Data Breach
data analysis
biblio
Issues and Trends in Information Security Policy Compliance
Submitted by grigby1 on Fri, 11/20/2020 - 1:26pm
ISP
threats
Standards organizations
Security Policies Analysis
security of data
security behaviour
pubcrawl
policy-based governance
Personnel
Organizations
organizational information security policies
Compliance
information security policy compliance
information security policy
information security management
information security incidents
information security
information leakage threats
information governance
information and communication technology
Industry 4.0
computer security
« first
‹ previous
1
2
3
4
5
next ›
last »