Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
foundations
biblio
Characterizing the Power of Moving Target Defense via Cyber Epidemic Dynamics
Submitted by shouhuai on Wed, 09/17/2014 - 6:31pm
Quantitative Verification
Systems Engineering
Modeling
Science of Security
Validation and Verification
CPS Technologies
Foundations
ACM CCS
CPS Technologies
Cyber Epidemic Dynamics
Cybersecurity dynamics
epidemic threshold
foundations
modeling
moving target defense
moving-target defense
Quantitative Verification
Science of Security
security models
systems engineering
Systems Security
validation and verification
ACM CCS
Moving-Target Defense
Systems Security
biblio
Human Factors in Webserver Log File Analysis: A Controlled Experiment on Investigating Malicious Activity
Submitted by llayman on Wed, 09/17/2014 - 6:30pm
Quantitative Verification
Science of Security
Validation and Verification
Foundations
ACM CCS
foundations
Human and Societal Aspects of Security and Privacy
Human Factors
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
log files
Quantitative Verification
Science of Security
security
Social Aspects of Security and Privacy
validation and verification
ACM CCS
Intrusion Detection Systems
Social Aspects of Security and Privacy
Human and Societal Aspects of Security and Privacy
Intrusion/Anomaly Detection and Malware Mitigation
biblio
Phishing in International Waters: Exploring Cross-national Differences in Phishing Conceptualizations Between Chinese, Indian and American Samples
Submitted by emerson on Wed, 09/17/2014 - 6:30pm
Science of Security
Foundations
ACM CCS
China
cultural differences
foundations
Human and Societal Aspects of Security and Privacy
India
information privacy
Intrusion/Anomaly Detection and Malware Mitigation
nationality
online privacy
Phishing
Privacy Protections
Science of Security
Social Aspects of Security and Privacy
Social Engineering Attacks
susceptibility
ACM CCS
Information Privacy
Phishing
Privacy Protections
Social Aspects of Security and Privacy
Social Engineering Attacks
Human and Societal Aspects of Security and Privacy
Intrusion/Anomaly Detection and Malware Mitigation
biblio
Less is More?: Investigating the Role of Examples in Security Studies Using Analogical Transfer
Submitted by arao on Wed, 09/17/2014 - 6:30pm
Systems Engineering
ACM CCS
Analogical Transfer
CPS Technologies
cyber security
foundations
Human and Societal Aspects of Security and Privacy
Human Factors
psychology
Science of Security
security
Social Aspects of Security and Privacy
systems engineering
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
ACM CCS
Cyber Security
Social Aspects of Security and Privacy
Human and Societal Aspects of Security and Privacy
biblio
A New Approach to Modeling and Analyzing Security of Networked Systems
Submitted by shouhuai on Wed, 09/17/2014 - 6:30pm
Modeling
Resilient Systems
Science of Security
Foundations
foundations
modeling
Resilient Systems
Science of Security
Security analysis
Security Metrics
Security modeling
Software Security Metrics
ACM CCS
Cyber Security
Security Metrics
Software Security Metrics
biblio
Log Your CRUD: Design Principles for Software Logging Mechanisms
Submitted by Laurie Williams on Wed, 09/17/2014 - 6:30pm
CPS Domains
Medical Devices
Health Care
Science of Security
Foundations
electronic health record software
Software and Application Security
Science of Security
science
nonrepudiation
medical devices
logging mechanism
Healthcare
health care
foundations
accountability
Database and Storage Security
Database Activity Monitoring
cyber security
CPS Domains
case study
black-box testing
audit
ACM CCS
ACM CCS
Cyber Security
Database Activity Monitoring
Database and Storage Security
Software and Application Security
biblio
Open vs. Closed Systems for Accountability
Submitted by adj on Wed, 09/17/2014 - 6:30pm
Systems Engineering
Science of Security
CPS Technologies
Foundations
accountability
ACM CCS
CPS Technologies
Database and Storage Security
foundations
identity
Information Accountability and Usage Control
Science of Security
systems engineering
utility
ACM CCS
Database and Storage Security
Information Accountability and Usage Control
biblio
A Rewriting-based Forwards Semantics for Maude-NPA
Submitted by Jose Meseguer on Wed, 09/17/2014 - 6:30pm
Modeling
Science of Security
Simulation
Foundations
ACM CCS
Applied cryptography
cryptographic protocol analysis
Cryptographic Protocols
Cryptography
foundations
logical narrowing-based reachability analysis
model checking
modeling
protocol verification
reasoning modulo an equational theory
Science of Security
simulation
standard rewriting-based model checking
term rewriting
ACM CCS
Cryptography
Applied Cryptography
Cryptographic Protocols
biblio
Architecture-based Self-protection: Composing and Reasoning About Denial-of-service Mitigations
Submitted by David Garlan on Wed, 09/17/2014 - 6:30pm
Architectures
Architectures
Modeling
Science of Security
Validation and Verification
CPS Technologies
Foundations
Hardware Security Implementation
validation and verification
Self-Adaptation
Security in Hardware
Science of Security
Probabilistic Model Checking
modeling
Logic and Verification
Hardware-Based Security Protocols
ACM CCS
foundations
Formal Security Models
Formal Methods and Theory of Security
Denial-of-Service
cyber security
CPS Technologies
Architectures
ACM CCS
Hardware-Based Security Protocols
Cyber Security
Formal Security Models
Formal Methods and Theory of Security
Logic and Verification
Hardware Security Implementation
Security in Hardware
biblio
In-nimbo Sandboxing
Submitted by scherlis on Wed, 09/17/2014 - 6:30pm
A Language and Framework for Development of Secure Mobile Applications
ACM CCS
foundations
Science of Security
Security Reasoning for Distributed Systems with Uncertainty
Systems Security
Vulnerability Management
A Language and Framework for Development of Secure Mobile Applications
ACM CCS
Systems Security
Vulnerability Management
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »