Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
information system
biblio
Dynamic Model of Cyber Defense Diagnostics of Information Systems With The Use of Fuzzy Technologies
Submitted by aekwall on Mon, 01/18/2021 - 10:34am
cyberattack
Scalability
Cryptography
Task Analysis
information security
Resiliency
pubcrawl
Metrics
Cybersecurity
Trojan horses
Fuzzy logic
probability
fuzzy set theory
security level
Information systems
information system
cyberattacks
differential equations
cryptographic level
cyber defense diagnostics
cyber defense systems
cyberattack intensity
cybersecurity status
delayed differential equation theory
dynamic model
fuzzy function
fuzzy technologies
information activity
logical fuzzy function
membership function
negative consequence probability
probability distribution density.
security status diagnosis
Fuzzy Cryptography
biblio
An Resilient Cloud Architecture for Mission Assurance
Submitted by aekwall on Mon, 11/16/2020 - 1:50pm
security of data
Monitoring
Cloud Computing
computer architecture
pubcrawl
Planning
Information systems
resilience
information system
Information services
cyber threat
Mission Assurance
complex cyber threat environment
cyber physical environment
dual loop architecture
environment awareness network
mission assurance system deployment mechanism
perception analysis planning adjustment
resilient cloud
resilient cloud architecture
resilient cloud environment
resilient dual loop architecture
resource planning
resource situation generation
Resiliency
Resilient Security Architectures
biblio
A Study on The Factors Affecting The Continuous Use of E-Government Services - Focused on Privacy and Security Concerns-
Submitted by grigby1 on Fri, 10/16/2020 - 10:10am
4th Industrial Revolution
Acceptance intention of E-government
collaboration
continuous use intention
Cybersecurity
data privacy
E-Government
e-government service
e-government services
Electronic government
government data processing
Human behavior
information and communication technology
information quality
information system
Information systems
internet
IS access model
Personnel
policy-based governance
privacy
privacy concerns
pubcrawl
quality factors
Quality of E-Government Services
quality of service
Reliability of E-government
resilience
Resiliency
risk factors
security
security concerns
service quality
Smart PLS
SPSS
system quality
TAM
technology acceptance model
user satisfaction
User satisfaction of E-Government Services
biblio
Brute-force and dictionary attack on hashed real-world passwords
Submitted by grigby1 on Fri, 09/04/2020 - 2:24pm
authorisation
pubcrawl
collaboration
Force
password
Human Factors
policy-based governance
information system
dictionary attack
Brute-force Attack
cracked passwords
Dictionaries
educational administrative data processing
Educational institutions
hashed passwords
hashed real-world passwords
hybrid attacks
online grading system
password cracking
password creation policies
password security
Slovenian university
uncracked passwords
brute force attacks
biblio
Using Attack Pattern for Cyber Attack Attribution
Submitted by grigby1 on Fri, 08/28/2020 - 11:23am
attack pattern
attack scenario
attribution
composability
computer network security
cyber attack
cyber attack initiator identification
Cyber Attribution
cyber attribution problem
data availability
data confidentiality
data integrity
Human behavior
individual organization
information system
Metrics
pubcrawl
biblio
An anomaly detection approach for enterprise file integration
Submitted by aekwall on Mon, 05/11/2020 - 10:29am
security of data
Organizations
data integrity
information security
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
Metrics
Anomaly Detection
Intrusion Detection
Standards organizations
middleware
security issues
information system
emergency management
accountability
network accountability
alarm system
corporate systems
effective self-learning anomaly detection module
emergency services
enterprise file integration
enterprise systems
file integration
file malfunction
file size
file structure
file transfer processes
file transfers
integration channels
integration duration
novel anomaly detection approach
organization work process management
real-time file integrations
transfer logs
transferring files
biblio
Information Systems and Network Technologies for Personal Data Cyber Security in Public Health
Submitted by aekwall on Mon, 05/04/2020 - 10:22am
composability
computer security
cyber security
health care
health information management systems
information management
information system
Information systems
Insurance
legislation
medical information systems
network technologies
Networked Control Systems Security
Organizations
personal data
personal data cyber security legislation
personal data cyber security systems
Predictive Metrics
pubcrawl
public health
public health enterprises
public health sector
public healthcare
Resiliency
security of data
Standards organizations
biblio
Mathematical Modeling of the Security Management Process of an Information System in Conditions of Unauthorized External Influences
Submitted by aekwall on Mon, 02/17/2020 - 1:22pm
Dynamical Systems
adaptive response unit
composability
conflict
dynamic analysis
impact
information system
mathematical modeling
Metrics
neural nets
neural network
Neural networks
privacy
pubcrawl
Resiliency
security management process
security of data
signal processing security
unauthorized external influences
wavelet transform
wavelet transforms
biblio
A Temporal Work Transference Event Log Trace Classification Algorithm and Its Experimental Analysis
Submitted by aekwall on Mon, 11/25/2019 - 1:00pm
Analogies and Transference
Classification algorithms
Data mining
History
hospitals
Human behavior
Human Factors
information system
Information systems
Organizations
pattern classification
Planning
process mining
pubcrawl
system memory
temporal work transference event log trace classification algorithm
Temporal Work Transference Pattern
Trace Classification
workflow enactment event log
Workflow Event Log
biblio
Security Challenges and Risk Evaluation Framework for Industrial Wireless Sensor Networks
Submitted by grigby1 on Wed, 05/30/2018 - 3:01pm
collaboration
condition monitoring
condition parameter monitoring
environmental monitoring
Human behavior
Human Factors
Industrial Control Systems
industrial wireless sensor networks
Industries
Industry 4.0
information system
intelligent manufacturing
IWSN
Metrics
Monitoring
Peer-to-peer computing
policy-based governance
production equipment
Production facilities
pubcrawl
resilience
Resiliency
risk evaluation
risk evaluation framework
risk management
security
security challenges
security weaknesses
smart factories
Wireless communication
wireless sensor networks
1
2
next ›
last »