Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
foundations
biblio
Trustworthy Context-dependent Services
Submitted by Heather Lucas on Wed, 09/17/2014 - 6:31pm
Resilient Systems
Science of Security
Foundations
ACM CCS
Domain-Specific Security and Privacy Architectures
foundations
Resilient Systems
Science of Security
Software and Application Security
Web Application Security
ACM CCS
Domain-Specific Security and Privacy Architectures
Web Application Security
Software and Application Security
biblio
Examining Reliability of Wireless Multihop Network Routing with Linear Systems
Submitted by rudra on Wed, 09/17/2014 - 6:31pm
Control
Modeling
Wireless Sensing and Actuation
CPS Technologies
Foundations
control
CPS Technologies
foundations
Information Flow Control
modeling
multihop networks
Reliability
stochastic dynamic systems
Systems Security
wireless sensing and actuation
Information Flow Control
Systems Security
biblio
Type-specific Languages to Fight Injection Attacks
Submitted by JonathanAldrich on Wed, 09/17/2014 - 6:31pm
Secure Control Systems
Science of Security
Foundations
ACM CCS
foundations
Science of Security
secure control systems
Software and Application Security
Web Application Security
ACM CCS
Web Application Security
Software and Application Security
biblio
Evidence-based Trust Reasoning
Submitted by jingweihuang on Wed, 09/17/2014 - 6:31pm
Modeling
Science of Security
Foundations
ACM CCS
Evidence-based trust
foundations
modeling
Operating systems security
privacy
Science of Security
Systems Security
Trust Frameworks
trust model
Trusted Computing
Trusted platforms
ACM CCS
Trusted Computing
Trusted platforms
Trust Frameworks
Operating Systems Security
Systems Security
biblio
An Analysis Method for Medical Device Security
Submitted by arnabray on Wed, 09/17/2014 - 6:31pm
CPS Domains
Medical Devices
Health Care
Science of Security
Foundations
ACM CCS
CPS Domains
cyber security
foundations
health care
medical device security
medical devices
Science of Security
Software and Application Security
Web Application Security
ACM CCS
Cyber Security
Web Application Security
Software and Application Security
biblio
InViz: Instant Visualization of Security Attacks
Submitted by llayman on Wed, 09/17/2014 - 6:31pm
Concurrency and Timing
Real-time Systems
Real-Time Coordination
Science of Security
Foundations
ACM CCS
concurrency and timing
Cyber Attacks
cyber security
Cybersecurity
foundations
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
log file
real-time analysis
Real-Time Coordination
real-time systems
Science of Security
visualization
ACM CCS
Cyber Attacks
Cyber Security
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
biblio
Cybersecurity Dynamics
Submitted by shouhuai on Wed, 09/17/2014 - 6:31pm
Modeling
Science of Security
Validation and Verification
Foundations
Cybersecurity dynamics
foundations
modeling
Science of Security
Security analysis
security model
validation and verification
ACM CCS
Cyber Security
biblio
Emergent Behavior in Cybersecurity
Submitted by shouhuai on Wed, 09/17/2014 - 6:31pm
Science of Security
Foundations
ACM CCS
cyber security
Cybersecurity
Emergent Behavior
foundations
Human and Societal Aspects of Security and Privacy
Science of Security
Security Properties
ACM CCS
Cyber Security
Human and Societal Aspects of Security and Privacy
biblio
Proving Abstractions of Dynamical Systems Through Numerical Simulations
Submitted by mitras on Wed, 09/17/2014 - 6:31pm
Systems Engineering
Science of Security
Simulation
Validation and Verification
CPS Technologies
Foundations
abstraction
ACM CCS
adversary
CPS Technologies
Cryptography
cyberphysical systems
foundations
Mathematical Foundations of Cryptography
Science of Security
simulation
systems engineering
validation and verification
verification
ACM CCS
Cryptography
Mathematical Foundations of Cryptography
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
biblio
Analyzing an Adaptive Reputation Metric for Anonymity Systems
Submitted by Nikita Borisov on Wed, 09/17/2014 - 6:31pm
Concurrency and Timing
Resilient Systems
Science of Security
Foundations
ACM CCS
anonymity
concurrency and timing
Database and Storage Security
Formal Methods and Theory of Security
foundations
Information Accountability and Usage Control
PID controller
Reputation Model
Resilient Systems
Science of Security
Security Metrics
Tor Network
ACM CCS
Database and Storage Security
Information Accountability and Usage Control
Formal Methods and Theory of Security
Security Metrics
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »