Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Information services
biblio
Trustworthiness Optimization of Industrial Cluster Network Platform Based on Blockchain
Submitted by
aekwall
on Mon, 03/11/2019 - 9:38am
Analytical models
Application Layer
blockchain
collaboration
composability
data layer
Distributed databases
Economics
industrial cluster
industrial cluster network platform
Industries
information service platform
Information services
information trustworthiness
network platform
optimisation
optimization
pubcrawl
security of data
small and medium-sized enterprises
small-to-medium enterprises
smart contracts
Trusted Computing
trustworthiness
trustworthiness optimization
biblio
Analysis of computer security incidents using fuzzy logic
Submitted by
grigby1
on Fri, 10/26/2018 - 4:00pm
Algorithm design and analysis
author signatures
computer security
computer security incident analysis
computer security incidents
Computers
cyber-attacks
cyberattacks
design pattern SOPKA
detection and prevention of cyber-attacks
digital signatures
Fuzzy logic
information security
Information services
Metrics
processing algorithm
Protocols
pubcrawl
recommender systems
Resiliency
Russian Federation
Russian ViPNet technology
security
the development of cyber-attack signatures
biblio
Ambiguity as a Barrier to Information Security Policy Compliance: A Content Analysis
Submitted by
grigby1
on Mon, 11/20/2017 - 11:25am
collaboration
Content analysis
education
educational institution
Educational institutions
Governance
Government
Guidelines
information security
information security policy compliance
Information services
InfoSec policy document
institutional information resources
Natural languages
Policy
Policy ambiguity
Policy clarity
Policy human aspects
policy-based governance
pubcrawl
security of data
security policies
Security policy compliance
Software
South Africa
text analysis
Usable Security
biblio
Security solutions for Web Service attacks in a dynamic composition scenario
Submitted by
BrandonB
on Tue, 05/05/2015 - 7:44am
API
application program interfaces
authentication
authorisation
authorization
confidentiality
data integrity
dynamic composition scenario
Electronic publishing
Information services
integrity
internet
Lead
nonrepudiation
Protocols
SAS API
schema hardening
schema validation
security
security solutions
service oriented architecture
service-oriented architecture
Simple object access protocol
SOA
SOAP
SOAP messages
SOAPAction spoofing
standards
UDDI
Web service attacks
web services
WS-Addressing spoofing
WSAS API
WSDL
XML injection