Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
government policies
biblio
Methodology for determining the energy deficit penalty function for hydrothermal dispatch
Submitted by grigby1 on Mon, 11/02/2020 - 10:41am
Linear programming
valor esperado condicional
sustainable development
Surges
security
Scalability
Reservoirs
pubcrawl
power system interconnection
power system economics
power generation planning
power generation economics
power generation dispatch
planejamento da operação
planejamento da expansão
objective function
Brazilian system
Input-Output Matrix
i/o systems security
i-o systems security
hydrothermal power systems
hydrothermal dispatch
hydroelectric reservoirs
hydroelectric power stations
government policies
função de penalização
energy deficits
energy deficit penalty function
Economics
economic deficit cost
custo de déficit
critério de suprimento
biblio
The Roles of E-Government in Healthcare from the Perspective of Structuration Theory
Submitted by grigby1 on Fri, 10/16/2020 - 10:23am
Lenses
Trajectory
structuration theory
security
Resiliency
resilience
qualitative methods
public administration
pubcrawl
policy-based governance
Medical services
collaboration
information technology
healthcare services
Healthcare
health care
government policies
Electronic government
e-government concept
E-Government
data analysis
Cybersecurity
biblio
Information Security Policy Perceived Compliance Among Staff in Palestine Universities: An Empirical Pilot Study
Submitted by grigby1 on Tue, 01/21/2020 - 10:23am
planned behaviour theory
Instruments
ISP
Least squares approximations
Mathematical model
Metrics
organisational aspects
Palestine university staffs
partial least squares structural equation modelling
Personnel
insider threat
PLS-SEM
policy-based governance
protection motivation theory
pubcrawl
resilience
Resiliency
security of data
statistical analysis
General Deterrence Theory
appraisal
Bibliographies
collaboration
Communications technology
compliance behaviour
data collection method
Educational institutions
employees
Security Policies Analysis
government policies
Human behavior
Human Factors
information reinforcement theory
information security
information security policy
Information Security Policy Awareness
information security risks mitigation
biblio
Deterring Strategic Cyberattack
Submitted by aekwall on Wed, 12/18/2019 - 1:37pm
collateral damage control
nuclear regime
nuclear deterrence versus cyber deterrence
nuclear deterrence
legal norm
international agreement
government policies
cyberwar
cyberattack deterrence
cyber-dependent infrastructure
Critical Infrastructure Protection
comprehensive defense
security of data
Deterrence
Cyberspace
resilience
cyberattack
privacy
pubcrawl
Human behavior
critical infrastructures
cyber security
Scalability
Computer crime
biblio
Research of Secure Service Composition Based on Semantic Security Policy
Submitted by grigby1 on Mon, 11/20/2017 - 11:25am
Protocols
web services
syntactic approaches
subsumption
service composition
Semantics
semantic security policy
Semantic
security policy
security policies
security of data
secure service composition
pubcrawl
cognition
policy-based governance
Policy
ontologies (artificial intelligence)
Ontologies
matching algorithm
government policies
Government
Governance
general security ontology
encryption
definition method
collaboration