Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
government data processing
biblio
Security Assessment of Libyan Government Websites
Submitted by
grigby1
on Wed, 10/23/2019 - 11:39am
Computer crime
Cryptography
data privacy
E-Government
encryption
Government
government data processing
Human behavior
In formation Security
internet
Libya E-government
Libyan government websites
Metrics
Penetration Testing
privacy
privacy polic
Privacy Policy
pubcrawl
Reconnaissance
resilience
Resiliency
Safety
Scalability
secure programming practices
security assessment
security assessment results
security issues
security level
security of data
security policies
SSL Trust Models
vulnerability assessment
Web sites
Website Vulnerability
biblio
Concept for Increasing Security of National Information Technology Infrastructure and Private Clouds
Submitted by
grigby1
on Fri, 09/28/2018 - 3:04pm
Cloud Computing
clouds
codes of countries
coding IPv6-addresses
computer network security
Cybersecurity
E-Government
e-governments
global information community
global routing prefix
government data processing
Human behavior
information security
information technology infrastructure
internet
IP networks
IPv6-header
IPv6-protocol
ISO standards
national information technology infrastructure
object identifier
Object recognition
policy-based governance
private clouds
Protocols
pubcrawl
resilience
Resiliency
Routing
Unicast
biblio
Empirical study of the impact of e-government services on cybersecurity development
Submitted by
grigby1
on Fri, 09/28/2018 - 3:04pm
2015 International Telecommunication Union
Communications technology
computer security
Correlation
cyber-security policy
Cybersecurity
Cybersecurity development
E-Government
E-government development
e-government development index
e-government services
Electronic government
global cybersecurity development index
government data processing
Human behavior
Indexes
Online service index
policy-based governance
pubcrawl
regression analysis
resilience
Resiliency
security of data
biblio
Automated U.S diplomatic cables security classification: Topic model pruning vs. classification based on clusters
Submitted by
K_Hooper
on Wed, 01/10/2018 - 10:14am
adversarial environment
automated US diplomatic cables security classification
automatic unstructured text security class detection
cyberattacks
data infrastructure protection
data leak prevention system
Data protection
DLP system
Edward Snowden incident
Electronic mail
email leakage
feature extraction
government data processing
Human behavior
Insider Threats
natural language processing
pattern classification
printers
protection mechanism
pubcrawl
Resiliency
Scalability
security
security of data
sensitive information leaks
sensitive text data
Sensitivity
Springs
text analysis
text leakage
text security classification
topic model pruning
Training
untrusted channels
US government
WikiLeaks dataset
biblio
Hybrid Focused Crawling for Homemade Explosives Discovery on Surface and Dark Web
Submitted by
grigby1
on Fri, 11/03/2017 - 10:29am
pubcrawl
Human behavior
Human Factors
dark web
internet
classifier-guided hyperlink selection strategy
Context
Crawlers
Darknets
explosives
focused crawling
Freenet
government data processing
homemade explosives discovery
hybrid focused crawling
I2P
information retrieval
search engines
surface Web
Terrorism
Tor
Uniform resource locators
Web pages
Web resource discovery
biblio
Cyber security operations centre: Security monitoring for protecting business and supporting cyber defense strategy
Submitted by
grigby1
on Tue, 03/07/2017 - 12:37pm
analysis
Business
business control
business protection
Computer crime
Correlation
CSOC
CSOC Benefits & Challenges
CSOC framework
CSOC Strategy
cyber defense strategy support
Cyber Incident Response
cyber security operations centre
cyber situational awareness
CyberSA
government data processing
Her Majestys Government
HMG protective monitoring controls
ICT systems
information and communications technology
Log Source
Monitoring
pubcrawl170109
risk management
security monitoring
security of data
SoC
system-on-chip
timing
biblio
Cybersecurity challenges for Bhutan
Submitted by
grigby1
on Tue, 03/07/2017 - 12:37pm
Bhutan government organisations
Computer crime
Computers
cyber threats
Cybersecurity
cybersecurity incidents
cybersecurity management
Government
government data processing
government organisations
government reports
Hacking
ICT developing country
information and communications technologies
internet
national media
organisational aspects
Phishing
pubcrawl170109
security of data
spamming
viruses
Viruses (medical)
biblio
2020 Cybercrime Economic Costs: No Measure No Solution
Submitted by
grigby1
on Tue, 03/07/2017 - 12:31pm
Computer crime
cyber security
cyber space
cyber-attacks
cybercrime economic cost
economic costs
Economics
government data processing
Measurement
Organizations
pubcrawl170109
Reliability
security of data
Stakeholders
biblio
"An imperceptible watermarking technique for copyright content using discrete cosine transformation"
Submitted by
grigby1
on Tue, 02/14/2017 - 11:55am
Computers
copyright
copyright content
Data protection
DCT
digital watermarking scheme
discrete cosine transformation
discrete cosine transforms
encryption
frequency domain
frequency-domain analysis
Government
government data processing
government sector
IDCT
Image coding
image compression
image protection scheme
image retrieval
image watermarking
pubcrawl170102
Watermarking
biblio
Ethics behind Cyber Warfare: A study of Arab citizens awareness
Submitted by
BrandonB
on Tue, 05/05/2015 - 10:55am
Arab citizens awareness
Computer crime
Computer hacking
Computers
cyber army
cyber attack
cyber security
cyber war
cyber warfare
defense
despotic government plans
ethical aspects
ethics
Government
government data processing
information technology
Law
military computing
military war
offence
personal information
scientific research centers
security systems
technological research centers