Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
foundations
biblio
Is There Value in Reasoning About Security at the Architectural Level: A Comparative Evaluation
Submitted by Heather Lucas on Wed, 09/17/2014 - 6:32pm
Science of Security
Foundations
ACM CCS
cyber security
foundations
Science of Security
Security in Hardware
ACM CCS
Cyber Security
Security in Hardware
biblio
Diversity-based Detection of Security Anomalies
Submitted by vouk on Wed, 09/17/2014 - 6:32pm
Testing
Systems Engineering
Science of Security
Validation and Verification
CPS Technologies
Foundations
ACM CCS
Attack detection
CPS Technologies
cyber security
diversity
foundations
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
redundancy in security
Science of Security
systems engineering
testing
validation and verification
web services
ACM CCS
Cyber Security
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
biblio
Access Control Policy Evolution: An Empirical Study
Submitted by Laurie Williams on Wed, 09/17/2014 - 6:32pm
Control
Science of Security
Foundations
access control policy
ACM CCS
control
Database and Storage Security
Evolution
foundations
Information Accountability and Usage Control
Science of Security
ACM CCS
Database and Storage Security
Information Accountability and Usage Control
biblio
Secure-by-construction Composable Componentry for Network Processing
Submitted by Heather Lucas on Wed, 09/17/2014 - 6:32pm
Embedded Software
Systems Engineering
Science of Security
CPS Technologies
Foundations
foundations
Tamper-Proof/Resistant Designs
systems engineering
Symmetric Cryptography and Hash Functions
stream processing
Security in Hardware
secure-by-construction
Science of Security
network processor
line-speed processor
hardware-software co-design
100 Gbps
Embedded Systems Security
embedded software
embedded hardware
Database and Storage Security
Data Anonymization and Sanitization
Cryptography
CPS Technologies
Block and Stream Ciphers
ACM CCS
ACM CCS
Cryptography
Block and Stream Ciphers
Data Anonymization and Sanitization
Embedded Systems Security
Database and Storage Security
Tamper-Proof/Resistant Designs
Security in Hardware
Symmetric Cryptography and Hash Functions
biblio
Securing Hadoop in Cloud
Submitted by vouk on Wed, 09/17/2014 - 6:32pm
Control
Science of Security
Foundations
ACM CCS
cloud
control
Cryptography
cyber security
foundations
Hadoop
key management
lack of fine-grained access control
Operating systems security
overloaded authentication key
Science of Security
security
Systems Security
Virtualization and Security
ACM CCS
Cryptography
Cyber Security
Key Management
Virtualization and Security
Operating Systems Security
Systems Security
biblio
Channel Correlation Modeling for Link Signature Security Assessment
Submitted by Huaiyu on Wed, 09/17/2014 - 6:32pm
Wireless Sensing and Actuation
Science of Security
CPS Technologies
Foundations
ACM CCS
channel correlation
CPS Technologies
cyber security
foundations
link signature
physical layer security
Science of Security
Systems Security
wireless sensing and actuation
ACM CCS
Cyber Security
Systems Security
biblio
Building the Security Behavior Observatory: An Infrastructure for Long-term Monitoring of Client Machines
Submitted by aforget on Wed, 09/17/2014 - 6:32pm
Architectures
Architectures
ACM CCS
Architectures
CPS Technologies
cyber security
Database and Storage Security
foundations
Hardware Security Implementation
Human and Societal Aspects of Security and Privacy
Management and Querying of Encrypted Data
Science of Security
Security in Hardware
USE: User Security Behvaior
ACM CCS
Cyber Security
Database and Storage Security
Management and Querying of Encrypted Data
Hardware Security Implementation
Human and Societal Aspects of Security and Privacy
Security in Hardware
biblio
Limiting Recertification in Highly Configurable Systems: Analyzing Interactions and Isolation Among Configuration Options
Submitted by Pfeffer Juergen on Wed, 09/17/2014 - 6:32pm
Certification
Concurrency and Timing
ACM CCS
certification
composability
concurrency and timing
configuration options
cyber security
Formal Methods and Theory of Security
foundations
Logic and Verification
network analysis
Science of Security
Security Metrics
validation and verification
ACM CCS
Cyber Security
Formal Methods and Theory of Security
Logic and Verification
biblio
Personalized Password Guessing: A New Security Threat
Submitted by Zbigniew Kalbarczyk on Wed, 09/17/2014 - 6:31pm
Modeling
Science of Security
Foundations
ACM CCS
cyber security
foundations
Graphical Model
guessing
Human and Societal Aspects of Security and Privacy
modeling
password
personalized
Science of Security
suggestion
ACM CCS
Cyber Security
Human and Societal Aspects of Security and Privacy
Data Driven Security Models and Analysis
biblio
Preemptive Intrusion Detection
Submitted by Zbigniew Kalbarczyk on Wed, 09/17/2014 - 6:31pm
Systems Engineering
Modeling
Science of Security
CPS Technologies
Foundations
ACM CCS
CPS Technologies
credential stealing attack
cyber security
cyber-system
factor graph
foundations
Graphical Model
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
modeling
Science of Security
security incident
systems engineering
tagging
timeliness
ACM CCS
Cyber Security
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
Data Driven Security Models and Analysis
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »