Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Personnel
biblio
Security Risk Assessment of Multimodal Transport Network Based on WBS-RBS and PFWA Operator
Submitted by aekwall on Mon, 02/17/2020 - 2:28pm
personnel risk
work breakdown structure (WBS)
WBS-RBS
waterway transportation
security risk factors
security risk assessment method
risk matrix 0-1 assignment
risk breakdown structure(RBS)
railways
railway-highway-waterway intermodal transportation process
railway transportation
Rail transportation
Pythagorean fuzzy weighted average(PFWA) operator
Pythagorean fuzzy weighted average operator
Pythagorean fuzzy number
PFWA operator
security
Personnel
multimodal transport network
multimodal transport
highway transportation
automotive components
security risk assessment
Security Risk Management
Transportation
fuzzy set theory
risk management
Metrics
pubcrawl
Resiliency
Scalability
Safety
biblio
A Learning Kit on IPv6 Deployment and Its Security Challenges for Neophytes
Submitted by grigby1 on Tue, 01/21/2020 - 12:09pm
Personnel
Training
tools
Software
self-learning
security model
security challenges
security
Resiliency
resilience
pubcrawl
Protocols
pre-alpha testing
policy-based governance
collaboration
Organizations
network security
neophytes
neophyte
Metrics
learning kit
IT personnel
ipv6 security
IPv6 environment
IPv6 deployment
IP networks
computer network security
composability
biblio
The Location-Centric Approach to Employee's Interaction Pattern Detection
Submitted by grigby1 on Tue, 01/21/2020 - 11:24am
Insider Threat Detection
Access Control
access control system
authorisation
business data processing
business processes
collaboration
data analysis
Data mining
data visualisation
Data visualization
employee interaction pattern detection
Human behavior
information security
insider threat
visualization-driven technique
location-centric approach
location-centric bevavior patterns
Metrics
Organizations
Personnel
policy-based governance
pubcrawl
resilience
Resiliency
security policies
sensors
step charts
Task Analysis
biblio
Information Security Policy Perceived Compliance Among Staff in Palestine Universities: An Empirical Pilot Study
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
planned behaviour theory
Instruments
ISP
Least squares approximations
Mathematical model
Metrics
organisational aspects
Palestine university staffs
partial least squares structural equation modelling
Personnel
insider threat
PLS-SEM
policy-based governance
protection motivation theory
pubcrawl
resilience
Resiliency
security of data
statistical analysis
General Deterrence Theory
appraisal
Bibliographies
collaboration
Communications technology
compliance behaviour
data collection method
Educational institutions
employees
Security Policies Analysis
government policies
Human behavior
Human Factors
information reinforcement theory
information security
information security policy
Information Security Policy Awareness
information security risks mitigation
biblio
Choice of Control Parameters of Complex System on the Basis of Estimates of the Risks
Submitted by grigby1 on Wed, 10/23/2019 - 12:36pm
patents
Security Risk Estimation
security
search problems
Scalability
risk estimation
risk analysis
Resiliency
resilience
rational managing directors
Qualifications
pubcrawl
Personnel
asset management
minimization of risk
Metrics
Meteorology
Licenses
intangible assets
Human Factors
Human behavior
group of the operating factors
estimation
estimate of the risk of functioning
criteria factor
biblio
Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organisation
Submitted by aekwall on Tue, 10/22/2019 - 9:54am
employees motivation
Security Policies Analysis
variable perceived value congruence
self-determination theory
Security policy compliant behaviour
security performance
Saudi Arabia
relatedness
perceived value congruence
perceived legitimacy
ISP compliance intentions
intrinsic motivation
information security policy compliance
information security policy
Fortune 600 organization
security of data
competence
behavioral research
autonomy
Human Factors
Personnel
computer security
Mathematical model
organisational aspects
policy-based governance
pubcrawl
Electronic mail
information security
Data models
Task Analysis
biblio
Balancing Organizational Incentives to Counter Insider Threat
Submitted by aekwall on Wed, 05/08/2019 - 9:47am
positive incentives
negative incentives
organisational aspects
organizational aspects
organizational context
organizational supportiveness
Organizations
perceived organizational support
Personnel
Monitoring
psychology
pubcrawl
resilience
security of data
sociotechnical systems
software engineering
traditional security practices
workforce management practices
Engagement
balanced combination
balances organizational incentives
balancing organizational incentives
best practices
computer security
contracts
dysfunctional management practices
employee welfare
authorisation
Human behavior
human resources management
insider threat
insider threat program
insider wrongdoing
Metrics
missing dimension
biblio
The Method of Expert Evaluation of Airports Aviation Security Using Perceptual Calculations
Submitted by grigby1 on Wed, 11/14/2018 - 1:20pm
restricted areas protection
Linguistics
perceptual calculations
perceptual computer
Personnel
proactive control
pubcrawl
resilience
Resiliency
intruders
Scalability
SCAUI elements
SCAUI state control
system of counteraction to acts of unlawful interference
technical systems
type-2 fuzzy sets
uncertainty
unlawful interference
AS employees
security
acts of unlawful interference
aircraft safety
airport
airport AS
airport security
Airports
airports aviation security
expert systems
Atmospheric modeling
aviation security
Computational modeling
expert evaluation
expert quality assessment
functional state
Fuzzy sets
Human behavior
biblio
Modeling User Communities for Identifying Security Risks in an Organization
Submitted by grigby1 on Mon, 03/05/2018 - 1:23pm
security of data
Peer-to-peer computing
Personnel
production environment
pubcrawl
resilience
Resiliency
Scalability
security
peer to peer security
security risks
team working
tools
UEBA
User and Entity Behavior Analytics
user communities
user feedback
Measurement
Companies
entity behavior analytics
feature-based weight assignments
Human behavior
Human Factors
insider threat
Louvain method
Louvain modularity
community detection
Metrics
network traffic
Niara's data
optimization
peer group creation
Peer grouping
peer grouping employees
biblio
An Effective Immersive Cyber Security Awareness Learning Platform for Businesses in the Hospitality Sector
Submitted by K_Hooper on Wed, 01/10/2018 - 11:11am
pubcrawl
Human Factors
immersive cyber security awareness learning platform
immersive systems
Industries
industry requirement
learning management system
paper-based training
Personnel
potential attackers
human factor
rapid digitalisation
Resiliency
secured interaction
security breaches
security of data
Systematic Requirement Engineering
threat analysis
Training
gamification elements
composability
computer games
computer science education
computer security
cyber-attacks
cyber security awareness
cyber security program
E-Learning
Gamification
Companies
Hospitality
hospitality businesses
hospitality employees
hospitality industry
hospitality sector
hotel industry
Human behavior
human error
« first
‹ previous
1
2
3
4
5
next ›
last »