Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Bibliographies
biblio
Financial Technology Risk Analysis for Peer to Peer Lending Process: A Case Study of Sharia Aggregator Financial Technology
Submitted by grigby1 on Fri, 02/03/2023 - 5:14pm
Industries
Peer-To-Peer
Fintech sharia
financial technology
peer to peer security
Insurance
Bibliographies
Technological innovation
Companies
Peer-to-peer computing
Scalability
Instruments
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Static Analysis of Infrastructure as Code: a Survey
Submitted by aekwall on Thu, 02/02/2023 - 5:36pm
model checking
survey
infrastructure as code
Software systems
static code analysis
Software Architecture
codes
verification
Cloud Computing
software reliability
static analysis
Bibliographies
composability
Human behavior
Resiliency
pubcrawl
Conferences
biblio
Artificial Intelligence for Edge Computing Security: A Survey
Submitted by grigby1 on Fri, 12/09/2022 - 5:54pm
edge computing
Cloud Computing
security
pubcrawl
Human behavior
Metrics
Resiliency
privacy
composability
Literature Review
Artificial Intelligence
Measurement
resilience
Market research
Systematics
artificial intelligence security
Bibliographies
biblio
The Analysis of Human Attitude toward Cybersecurity Information Sharing
Submitted by grigby1 on Thu, 09/29/2022 - 4:38pm
Organizational learning
Management
vulnerabilities
Bibliographies
information sharing
attitude
behavior
Human Attitude
involvement
best practices
Organizations
pubcrawl
Human behavior
computer security
Cyber-security
Cybersecurity
taxonomy
biblio
Using the Theory of Interpersonal Behavior to Predict Information Security Policy Compliance
Submitted by grigby1 on Mon, 04/18/2022 - 10:52am
information theoretic security
Bibliographies
Compliance
Data protection
Government
government effectiveness
information security
information security policy (ISP)
policy-based governance
Predictive models
pubcrawl
Regulation
security policies
theory of interpersonal behavior (TIB)
biblio
Advances on Security in Ad Hoc Networks: A preliminary analysis
Submitted by grigby1 on Tue, 02/08/2022 - 11:47am
Compositionality
MANET security
Tolerance
Survivability
Bibliometrics
Bibliographies
MANET
Systematics
Market research
security
taxonomy
VANET
Ad hoc networks
composability
Resiliency
resilience
Metrics
pubcrawl
biblio
ML-based NIDS to secure RPL from Routing Attacks
Submitted by aekwall on Mon, 11/29/2021 - 1:53pm
security
IoT
Routing
Protocols
real-time systems
Conferences
pubcrawl
Resiliency
composability
Bibliographies
6LoWPAN
Topology
RPL
LLNs
NIDS for RPL
biblio
A Systematic State-of-the-Art Analysis of Multi-Agent Intrusion Detection
Submitted by aekwall on Wed, 08/11/2021 - 2:29pm
computer architecture
Intrusion Detection
computer networks
pubcrawl
Resiliency
composability
computer security
Systematics
attacks
Bibliographies
cyberphysical system
IDS architectures
malware
multi-agent
review
intrusion tolerance
biblio
AI in Cybersecurity Education- A Systematic Literature Review of Studies on Cybersecurity MOOCs
Submitted by grigby1 on Tue, 05/25/2021 - 2:35pm
AI
Bibliographies
computer security
cyber education
cyber physical systems
Cybersecurity
cybersecurity education
education
machine learning
MOOC
privacy
pubcrawl
systematic literature review
Systematics
biblio
Towards an Improved Understanding of Human Factors in Cybersecurity
Submitted by aekwall on Mon, 10/12/2020 - 11:45am
security of data
Human behavior
pubcrawl
Cybersecurity
Bibliographies
computer security
psychology
Human Factors
social aspects of automation
cybersecurity-human-factors-personality-culture-demographics
human factor
secure digital environments
sociotechnical aspects
Human Behavior and Cybersecurity
1
2
next ›
last »