Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
security management
biblio
The Research on Material Properties Database System Based on Network Sharing
Submitted by grigby1 on Fri, 03/17/2023 - 12:15pm
Java
Network sharing
material properties
J2EE
intelligent service
data security control
database
relational database security
Database systems
security management
Data visualization
pubcrawl
composability
data acquisition
Access Control
Data models
Software
Resiliency
resilience
Metrics
Human behavior
biblio
SecSoC: A Secure System on Chip Architecture for IoT Devices
Submitted by grigby1 on Tue, 02/28/2023 - 5:50pm
integrated circuits
secure processor
secure architecture
reduced instruction set computing
hardware decryption
security management
hardware encryption
operating systems
Hardware Security
composability
computer architecture
IoT security
performance evaluation
Hardware
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Quantitative Risk Assessment of Threats on SCADA Systems Using Attack Countermeasure Tree
Submitted by grigby1 on Fri, 02/17/2023 - 5:13pm
critical infrastructure
security
pubcrawl
resilience
Resiliency
SCADA systems
cyber-physical systems
Compositionality
SCADA
power systems
security threat
security management
SCADA Systems Security
threat assessment
attack countermeasure tree
quantitative assessment
biblio
Research on system construction under the operation mode of power grid cloud security management platform
Submitted by aekwall on Fri, 01/13/2023 - 4:06pm
computer architecture
Scalability
pubcrawl
Compositionality
cloud computing security
Data processing
Cloud Computing
maintenance engineering
System performance
Technical requirements
Cloud management platform
security management
security scalability
biblio
Research on Big Data Security and Privacy Risk Governance
Submitted by grigby1 on Fri, 11/18/2022 - 2:07pm
Market research
Security Risk Management
Risk Governance Points
international standards
Big Data Security and Privacy
legislation
security management
Regulation
Current measurement
pubcrawl
Big Data
data privacy
Scalability
Resiliency
resilience
Metrics
Human Factors
Human behavior
biblio
Analysis on security management for supply chain under Emergencies
Submitted by grigby1 on Fri, 09/09/2022 - 4:04pm
supply chain security
business continuity
business continuity management
Focusing
organizational resilience
pubcrawl
quality assurance
resilience
Resiliency
security management
standards
Supply Chain
supply chains
biblio
Analysis of Supply Chain Security Management Systems Based on ISO 28001: 2007: Case Study Leather Factory in Indonesia
Submitted by grigby1 on Fri, 09/09/2022 - 3:59pm
information security
risk management
security
Supply Chain
pubcrawl
Metrics
ISO standards
supply chains
threat
Industrial engineering
security management
Production facilities
ISO 28001:2007
supply chain risk assessment
biblio
Information Security of Logistics Services
Submitted by grigby1 on Fri, 09/09/2022 - 3:36pm
supply chain risk assessment
Companies
Economics
information security
Logistics
Monitoring
pubcrawl
resilience
Resiliency
risk management
Safety
security
security management
supply chain security
supply chains
biblio
A Security Analysis of Chinese Robot Supply Chain Based on Open-Source Intelligence
Submitted by grigby1 on Fri, 08/26/2022 - 1:21pm
pubcrawl
text analysis
supply chains
Sino-US game
security management
Scalability
robot supply chain
Risk
Resiliency
resilience
supply chain security
Predictive models
Open-Source Intelligence
machine learning algorithms
Human Factors
Human behavior
game theory
Control Theory
appraisal
biblio
Terminal Security Reinforcement Method based on Graph and Potential Function
Submitted by grigby1 on Fri, 08/26/2022 - 11:08am
security
pubcrawl
Computational modeling
edge computing
Metrics
automation
Computing Theory
security management
1
2
3
4
next ›
last »