Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
information management
biblio
Anon-ISAC: Anonymity-preserving cyber threat information sharing platform based on permissioned Blockchain
Submitted by grigby1 on Thu, 01/28/2021 - 2:02pm
anonymity
blockchain
composability
computer security
Cybersecurity
Electrical Engineering
Human behavior
information management
IoT
Metrics
Organizations
privacy
pubcrawl
Public key
resilience
Resiliency
biblio
Encrypted Keyword Search in Cloud Computing using Fuzzy Logic
Submitted by aekwall on Mon, 01/18/2021 - 11:34am
Cloud Computing
Scalability
Servers
Keyword search
authorisation
Cryptography
data confidentiality
encryption
data encryption
Resiliency
pubcrawl
Metrics
query processing
Data protection
Fuzzy logic
fuzzy set theory
Indexes
information management
search engines
sensitive information
vital information
cloud service providers
complex Boolean queries
encrypted keyword search
fuzzy keyword search
Fuzzy Keyword Sets
information management professionals
keyword privacy
keyword safety
N-grams
Privacy Preserving Fuzzy Search
user document protection
Fuzzy Cryptography
biblio
Research on Governmental Data Sharing Based on Local Differential Privacy Approach
Submitted by grigby1 on Fri, 10/16/2020 - 11:24am
blockchain
collaboration
Cybersecurity
data privacy
data sharing
differential privacy
E-Government
e-government applications
Government
government data processing
government departments
government information resources
governmental data sharing
governmental departments
information management
information sharing
local differential privacy
Peer-to-peer computing
policy-based governance
privacy
privacy disclosure
privacy protection models
Privacy-preserving
private blockchain
pubcrawl
resilience
Resiliency
sharing statistics
statistical analysis
statistical data
biblio
Study on E-government Information Security in the Era of Big Data
Submitted by grigby1 on Fri, 10/16/2020 - 11:13am
Big Data
Cloud Computing
collaboration
complex system
Cryptography
Cybersecurity
data application
E-Government
E-government development
e-government hierarchy model
e-government information management
e-government information security system
Electronic government
encryption
government data processing
Human behavior
identity authentication
information confidentiality
information management
information management departments
information security awareness
information security threats
information storage
intranets
large-scale network
management deficiency
network technology defects
policy-based governance
proper information encryption
pubcrawl
resilience
Resiliency
set pair analysis theory
strict information management
survivability association
biblio
Research on Government Information Sharing Model Using Blockchain Technology
Submitted by grigby1 on Fri, 10/16/2020 - 11:13am
Barn Effect
blockchain
blockchain technology
blockchain-based solution
Chinese government
collaboration
Cryptography
Cybersecurity
Data engineering
E-Government
Electronic government
government affairs
government data processing
government information management
government information resource models
Government Information Sharing
government information sharing model
Human behavior
information interaction analysis
information management
information resources
Information services
information sharing solution
policy-based governance
pubcrawl
resilience
Resiliency
security
service-oriented e-government
biblio
Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
security of data
Cloud Computing
data privacy
security
Resiliency
pubcrawl
Metrics
cyber-attacks
collaboration
Logic gates
Scalability
application program interfaces
internetworking
Portals
data sources
information management
network threats
data sharing
API Gateway
attack prediction
C3ISP Framework
collaborative analysis
Collaborative sharing
Confidential Information Sharing and Analysis for Cyber Protection
CTI data
Cyber Threat Information
cyber threat management
privacy exposure
privacy preserving
privacy-preserving means
privacy-preserving Sharing
user privacy in the cloud
biblio
Information Systems and Network Technologies for Personal Data Cyber Security in Public Health
Submitted by aekwall on Mon, 05/04/2020 - 11:22am
composability
computer security
cyber security
health care
health information management systems
information management
information system
Information systems
Insurance
legislation
medical information systems
network technologies
Networked Control Systems Security
Organizations
personal data
personal data cyber security legislation
personal data cyber security systems
Predictive Metrics
pubcrawl
public health
public health enterprises
public health sector
public healthcare
Resiliency
security of data
Standards organizations
biblio
A System Architecture of Cybersecurity Information Exchange with Privacy (CYBEX-P)
Submitted by grigby1 on Fri, 04/03/2020 - 12:33pm
privacy
security of data
Organizations
Servers
pubcrawl
Human behavior
data privacy
Scalability
Databases
computer security
Privacy Policies
cyber defense
cyber threats
cyber-information exchange
Cybersecurity
cybersecurity information exchange
cybersecurity information exchange with privacy
cybersecurity information sharing platform
cybersecurity techniques
CYBEX-P
information exchange
information exchange platform
information management
information sharing
privacy preservation
privacy-preserving mechanisms
shared data
shared threat data
STIX
versatile information exchange platform
biblio
An Advance Cryptographic Solutions in Cloud Computing Security
Submitted by grigby1 on Fri, 03/27/2020 - 11:28am
access management
biometric
biometric coding
biometric knowledge
biometrics (access control)
Ciphers
Cloud Computing
cloud computing security
collaboration
computer security
Cryptography
encoding
Fingerprint recognition
Human behavior
Human Factors
identification mechanism
information management
innovative safe cloud computing design
Metrics
policy-based governance
pubcrawl
resilience
Resiliency
Safe Coding
Safety
Virtualization
biblio
Incentive Contract for Cybersecurity Information Sharing Considering Monitoring Signals
Submitted by grigby1 on Wed, 03/18/2020 - 11:51am
security of data
Monitoring
risk management
Scalability
computer security
contracts
Cyber Insurance
cyber risk transfer
cybersecurity information haring
cybersecurity information sharing
Environment monitoring
ethics
incentive contract
Incentive mechanism
Incentive Model
information management
information sharing output
Insurance
monitoring signals
Moral Hazard
pubcrawl
composability
collaboration
Policy-Governed Secure Collaboration
Metrics
Resiliency
resilience
Human behavior
Science of Security
1
2
3
next ›
last »