Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Standards organizations
biblio
Secure Wipe Out in BYOD Environment
Submitted by
aekwall
on Mon, 01/11/2021 - 12:30pm
Scalability
encryption
Hardware
performance evaluation
real-time systems
pubcrawl
tools
privacy
Standards organizations
computer science
BYOD
cryptographic erasure
deletion
Memory Forensics
Per-file deletion
data deletion
biblio
Analysis of key Factors for Organization Information Security
Submitted by
grigby1
on Fri, 11/20/2020 - 1:26pm
Data protection
Human Factors
information protection
information security
Information Security Culture
information security structure
information security system
insiders misuse
organisational aspects
organization information security
Organizations
outsider attack
policy-based governance
pubcrawl
security culture
security of data
Security Policies Analysis
Standards organizations
Training
User awareness
User training
biblio
Issues and Trends in Information Security Policy Compliance
Submitted by
grigby1
on Fri, 11/20/2020 - 1:26pm
Compliance
computer security
Industry 4.0
information and communication technology
information governance
information leakage threats
information security
information security incidents
information security management
information security policy
information security policy compliance
ISP
organizational information security policies
Organizations
Personnel
policy-based governance
pubcrawl
security behaviour
security of data
Security Policies Analysis
Standards organizations
threats
biblio
The correlation between intellectual property management and quality management in the modern knowledge-based economy
Submitted by
grigby1
on Thu, 07/30/2020 - 1:05pm
Organizations
organisational aspects
pubcrawl
Human behavior
Human Factors
policy-based governance
resilience
Resiliency
industrial property
intellectual property
Standards organizations
composability
Law
knowledge management
Metrics
Technological innovation
ip protection
design activities
Economics
industrial knowledge-based organization
intellectual property management
intellectual property policies
knowledge based economy
knowledge based systems
knowledge-based economy
Management
organization
quality management
quality policies
quality policy
biblio
Automated Security Configuration Checklist for Apple iOS Devices Using SCAP v1.2
Submitted by
aekwall
on Mon, 07/27/2020 - 11:20am
Apple iOS
Apple iOS device configuration
automated security configuration checklist
automation
Compliance
Compositionality
Human Factors
information security management tasks
iOS (operating system)
iOS Security
Metrics
Monitoring
organization
Organizations
patch management
policy compliance
pubcrawl
Resiliency
SCAP
security automation
security baseline
security configurations monitoring
security content automation protocol
security of data
security-related configuration settings
Standards organizations
tools
Vulnerability
biblio
An anomaly detection approach for enterprise file integration
Submitted by
aekwall
on Mon, 05/11/2020 - 10:29am
security of data
Organizations
data integrity
information security
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
Metrics
Anomaly Detection
Intrusion Detection
Standards organizations
middleware
security issues
information system
emergency management
accountability
network accountability
alarm system
corporate systems
effective self-learning anomaly detection module
emergency services
enterprise file integration
enterprise systems
file integration
file malfunction
file size
file structure
file transfer processes
file transfers
integration channels
integration duration
novel anomaly detection approach
organization work process management
real-time file integrations
transfer logs
transferring files
biblio
Information Systems and Network Technologies for Personal Data Cyber Security in Public Health
Submitted by
aekwall
on Mon, 05/04/2020 - 10:22am
composability
computer security
cyber security
health care
health information management systems
information management
information system
Information systems
Insurance
legislation
medical information systems
network technologies
Networked Control Systems Security
Organizations
personal data
personal data cyber security legislation
personal data cyber security systems
Predictive Metrics
pubcrawl
public health
public health enterprises
public health sector
public healthcare
Resiliency
security of data
Standards organizations
biblio
The Method of Assessing the Level of Compliance of Divisions of the Complex Network for the Corporate Information Security Policy Indicators
Submitted by
grigby1
on Fri, 04/03/2020 - 11:04am
collaboration
comparative assessment
complex network
complex networks
compliance level assessment
corporate information security policy indicators
corporate information security policy requirements
corporate information system
criteria
Decision Making
decision-making
Games
information security
Information services
Information systems
maximin and minimax procedures
Organizations
Policy Based Governance
policy-based governance
pubcrawl
ranking of the values of indicators
risk management
risk minimization
security of data
Standards organizations
the accounts of the Board
the Hamming distance
the ratio of Pareto
biblio
Need of Private and Public Sector Information Security
Submitted by
grigby1
on Fri, 04/03/2020 - 11:03am
airport like security with digital boxes
Airports
AS-IS office system
authorisation
biometric
biometrics (access control)
Buildings
collaboration
conveyor belts
data entry-exit log
Data protection
digital bar-coded air port
digital bar-coded conveyor boxes
evaes-dropping
government buildings
government data processing
government offices
information security
information stealing
information technicians
Intel
Intelligent systems
Internet of Things
knowledge based systems
man in middle
Organizations
personnel security
Policy Based Governance
Portable computers
private buildings
private sector information security
pubcrawl
public sector information security
sensitive information
sentinel systems
smart information security Intel processes
Standards organizations
virtual data tables
biblio
Designing Good Security Metrics
Submitted by
grigby1
on Mon, 02/17/2020 - 4:07pm
Measurement
metrics testing
designing
Firewalls (computing)
good security metric
good security metrics
Human behavior
Measurement and Metrics Texting
Metrics
Organizations
policy-based governance
pubcrawl
resilience
Resiliency
Security Metrics
security of data
security weaknesses
Software
Standards organizations
step-by-step method
testing
weaknesses
1
2
3
next ›
last »