Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Investment
biblio
Mathematical Model For Information Security System Effectiveness Evaluation Against Advanced Persistent Threat Attacks
Submitted by grigby1 on Fri, 01/22/2021 - 12:38pm
security of data
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
advanced persistent threat
APT
gradient methods
APT attack
advanced persistent threat attacks
Mathematical model
objective function
information security system
Investment
APT attacks
attack minimization
effectiveness evaluation
formulated efficiency criterion
generalized efficiency criterion
generalized reduced gradient method
information security controls optimization
information security system effectiveness evaluation
information security systems effectiveness
mathematical programming
security investment maximization
biblio
EEG-Based Neural Correlates of Trust in Human-Autonomy Interaction
Submitted by aekwall on Mon, 11/23/2020 - 10:37am
autonomous systems
brain
Brain modeling
Computational modeling
eeg
electroencephalography
electroencephalography signals
feature extraction
fourier analysis
Games
Human behavior
human factor
human trust
human-autonomy interaction
Investment
medical signal processing
Mixed model analysis
neurophysiology
power spectrum
pubcrawl
trust
biblio
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes
Submitted by grigby1 on Fri, 11/20/2020 - 1:26pm
Companies
data analysis
Data Breach
employees
financial data processing
financial investment
humble inquiry
Interviews
Investment
organisational aspects
organization security division
participatory action research
Personnel
policy-based governance
post-breach security
post-breach security changes
Productivity
pubcrawl
security behaviour
security breach
security controls
security culture
security division
security of data
security policies
Security Policies Analysis
security theatre
Task Analysis
zero risk appetite
biblio
Challenges of IoT Based Smart-Government Development
Submitted by grigby1 on Fri, 10/16/2020 - 10:22am
collaboration
Cybersecurity
E-Government
e-governments
Electronic government
extended smart-government
Government 2.0
government data processing
Internet of Everything (IoE)
Internet of Things
Internet of Things (IoT)
Investment
IoT based smart-government development
new generation smart government
policy-based governance
privacy
pubcrawl
resilience
Resiliency
security
security of data
smart cities
Smart Government
user study
biblio
Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening
Submitted by willirn1 on Thu, 05/30/2019 - 3:04pm
actuators
control
critical infrastructures
cyber physical systems
cyber-attacks
cyber-security risks
IIoT system security
Industrial Internet of Things
industrial platforms
integrated circuits
Internet of Things
Investment
production engineering computing
Redundancy
resilience
resilient IIoT systems
security
security economics
security of data
Transportation
Vanderbilt
biblio
Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening
Submitted by grigby1 on Mon, 01/21/2019 - 11:30am
actuator security
actuators
composability
critical infrastructures
cyber physical systems
cyber-attacks
cyber-security risks
Human behavior
IIoT system security
Industrial Internet of Things
industrial platforms
integrated circuits
Internet of Things
Investment
Metrics
production engineering computing
pubcrawl
Redundancy
resilience
Resiliency
resilient IIoT systems
security
security economics
security of data
Transportation
biblio
A Strategic Manufacturing Capacity and Supply Chain Network Design Contingency Planning Approach
Submitted by grigby1 on Mon, 12/03/2018 - 12:51pm
Capacity planning
Contingency Planning
Decision support systems
demand forecasting
finance
inventory investments
Investment
manufacturing
Metrics
optimisation
Planning
product distribution
profit maximizing plant locations
profitability
pubcrawl
reserve manufacturing capacity
resilience
Resiliency
risk assessment scheme
Safety
Scalability
scenario planning
strategic manufacturing capacity
strategic network design model
supply chain management
Supply Chain Network Design
supply chain network design contingency planning approach
supply chain risk assessment
supply chains
biblio
Shortfall-Based Optimal Security Provisioning for Internet of Things
Submitted by grigby1 on Thu, 06/07/2018 - 2:08pm
computer network security
continuous topology changes
Economics
Electronic mail
Internet of Things
Internet-of-Things scenarios
Investment
network security
optimisation
optimization
optimization problem
Pareto optimization
pubcrawl
resilience
Resiliency
resource allocation
resource management
risk management
risk measure
risk minimization
Scalability
security
security infrastructure
security resource allocation plan
shortfall-based optimal security provisioning
stochastic allocation
Stochastic computing
Stochastic Computing Security
telecommunication network topology
biblio
Security games on infrastructure networks
Submitted by grigby1 on Thu, 12/28/2017 - 12:34pm
attacker-defender interactions
collaboration
communication failures
Communication networks
composability
controller-disturbance interaction
cyber-physical security
cyber-physical systems
cyber-security modelling
Density estimation robust algorithm
distribution networks
game theory
game theory methods
Games
Human behavior
Human Factors
infrastructure networks
Inspection
interdependent security game
interdiction problem
Investment
IT systems
Load modeling
Metrics
network security game
networked control systems
node disruptions
optimal attack plans
Policy-Governed Secure Collaboration
pubcrawl
Resiliency
resource allocation
robust control models
Scalability
Science of Security
security
security of data
strategic edge disruptions
biblio
A Content-Based Phishing Email Detection Method
Submitted by grigby1 on Wed, 12/20/2017 - 12:07pm
Computer crime
content-based phishing email detection
Creativity
cybernetics
database management systems
Databases
Electronic mail
email categories
Filtering
fuzzy control
fuzzy logic control algorithm
Human behavior
Human Factors
information extraction
information storage
Investment
Phishing
phishing email
pubcrawl
Resource description framework
Semantic Web
semantic Web database
social engineering
social engineering concepts
social engineering criteria
unsolicited e-mail
1
2
next ›
last »