Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
security management
biblio
Modeling of Insider Threat using Enterprise Automaton
Submitted by grigby1 on Thu, 04/08/2021 - 4:55pm
authorisation
insider threat
Organizations
security
business data processing
pubcrawl
Human behavior
policy-based governance
resilience
Resiliency
data privacy
privacy issues
Computational modeling
Attack detection
automata
Metrics
Task Analysis
Silicon
security management
authorized privileges
enterprise automaton
Enterprise process
insider
insider agents
insider attacker
insider threat modeling
nonhuman agents
novel unified model
psycho-social behaviors
biblio
Policy-Based Network Access and Behavior Control Management
Submitted by grigby1 on Mon, 03/29/2021 - 2:25pm
abstract policy configuration
Access Control
application server
application system access control
authorisation
behavior control management
behavior control model
behavior management control
behavior management control process
Communication networks
computer network management
data drive
Data Driven
data fusion
device connection
Human behavior
identity authentication
Identity management
illegal outreach control
information network
integrated network access
management simplification
Network Access Control
network device
network servers
policy-based network access
process control
Protocols
pubcrawl
resilience
Resiliency
Scalability
security
security management
security monitoring
security policy
Servers
biblio
Research on Technology of Embedded System Security Protection Component
Submitted by grigby1 on Mon, 03/29/2021 - 12:03pm
composability
computer network management
computer network performance evaluation
computer network reliability
computer network security
Computers
cryptographic algorithm
Cryptography
embedded security protection system
embedded system security protection
embedded systems
graphical management interface
Internet of Things
Internet of Things development
IoT devices
Kernel
log management
Metrics
pubcrawl
Qt graphical management interface
resilience
Resiliency
security management
security management system
security policy management
TCP/IP protocol
TCPIP
transport protocols
Trusted Computing
trusted computing technology
whitelist management
whitelist-based security protection
biblio
A Dynamic Mechanism for Security Management in Multi-Agent Networked Systems
Submitted by grigby1 on Tue, 02/16/2021 - 12:44pm
pubcrawl
Metrics
resilience
Resiliency
computer network security
Communication networks
composability
network security
computer security
Cost accounting
Silicon
network theory (graphs)
multi-agent systems
computer networks
Probability distribution
private information
Strategic Agents
agents security state
dynamic mechanism design
dynamic mechanism design problem
incentive compatibility
inter-temporal correlations
interconnected multiagent networked systems
interdependent valuations
network coordinator
security management
social surplus maximization
social surplus maximizing mechanism
dynamic networks
biblio
A Reliable Ring Analysis Engine for Establishment of Multi-Level Security Management in Clouds
Submitted by grigby1 on Fri, 11/20/2020 - 2:14pm
security of data
Cloud Computing
Engines
security
pubcrawl
policy-based governance
collaboration
Indexes
service provider
security levels
Protocols
security requirements
Reliability
Policy Management
Semantics
indexing
security mechanism
cloud customers
index-based engine
mapping process
multilevel security management
policy management framework
ring analysis engine
security management
semantic analysis
Semantic Mapping
structural index
syntactic analysis
trust boundaries
Security Policies Analysis
biblio
Design and Realization of a Computer Security Control Circuit for Local Area Network
Submitted by aekwall on Mon, 05/04/2020 - 11:22am
cyberattack
computer network security
information security
Resiliency
pubcrawl
composability
Information systems
Local area networks
security management
Predictive Metrics
circuit design
Circuit synthesis
control unit
Hard disks
LAN computer security control circuit
LAN computers
LAN security
local area network computer security control circuit
management defect
network attack
new technology challenge
ordinary hard disk
secure hard disk
security threat
Networked Control Systems Security
biblio
Multi-Tenancy-Capable Correlation of Security Events in 5G Networks
Submitted by aekwall on Mon, 05/04/2020 - 11:07am
Monitoring
Cloud Computing
telecommunication security
security
mobile computing
computer architecture
computer network management
Resiliency
pubcrawl
Correlation
Stakeholders
5G mobile communication
telecommunication computing
security events
NFV
network slicing
security management
5G networks
Network Security Architecture
5G mobile networks
correlation workflow
event processing
infrastructure-as-a-service cloud providers
mobile network operators
multi-tenancy management
multitenancy-capable correlation
multitenancy-capable event correlation architecture
multitenancy-capable management architectures
network-slice-centric security event correlation
security management systems
software-as-a-service providers
telecommunication service providers
telecommunication services
biblio
On the Impact of Generative Policies on Security Metrics
Submitted by aekwall on Mon, 04/13/2020 - 10:13am
computer network security
authorisation
Access Control
computer network management
pubcrawl
policy-based governance
Grammar
computer security
Measurement
Security Metrics
security management
security policies
complex systems
Manuals
administrative overhead
generative policy based system
policy basedsecurity management
security policies generation
biblio
Security and Trust Issues on Digital Supply Chain
Submitted by grigby1 on Thu, 03/12/2020 - 12:08pm
advanced information technologies
Automated Response Actions
blockchain
Cloud Computing
composability
digital supply chain
digital supply chain management system
digital supply chain system
exploratory investigation
History
Human behavior
information science
information technology
Internet of Things
Pervasive Computing Security
pubcrawl
Reliability
resilience
Resiliency
Scalability
security
security management
security of data
supply chain management
supply chain security
supply chains
System performance
Traceability
trust issues
trust problems
Trusted Computing
biblio
Security Risk Assessment and Management as Technical Debt
Submitted by aekwall on Mon, 02/17/2020 - 2:27pm
security of data
Scalability
Organizations
Software
Resiliency
pubcrawl
Iterative methods
Metrics
risk management
software engineering
Unified modeling language
software security
security management
risk analysis
technical debt
information security
Security Risk Management
iterative software development
portfolio-based technical debt management framework
risk-based extensions
risk-based security engineering processes
security debt
security debt management approach
security engineering techniques
security risk assessment
software design
software development organizations
technical debt management systems
1
2
3
next ›
last »