Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Complexity theory
biblio
A graph theoretic approach to fast and accurate malware detection
Submitted by grigby1 on Wed, 06/20/2018 - 12:49pm
Malware Analysis
unknown malware
storage space
storage management
Robustness
Resiliency
resilience
pubcrawl
privacy
obfuscation attacks
nonsignature malware detection schemes
Metrics
Markov processes
benign software
malware
invasive software
Human behavior
GZero
graph theory
graph theoretic approach
feature extraction
false positive rate
detection time
Databases
Complexity theory
biblio
Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Languages
Submitted by grigby1 on Mon, 06/11/2018 - 3:46pm
collaboration
middleware security
security extension
modelling language
middleware
cyber security requirements
cyber security concepts
Business Process Model and Notation
business process
business data processing
BPMN processes
BPMN
specification languages
policy-based governance
resilience
Policy
Resiliency
Complexity theory
Formal Specification
visualization
Semantics
tools
computer security
security framework
security of data
composability
pubcrawl
biblio
Verification of Randomized Security Protocols
Submitted by grigby1 on Thu, 05/24/2018 - 12:22pm
Policy
Upper bound
standard cryptographic primitives
sequences
sequence
secret sec
secrecy problem
randomized security protocol Verification
pubcrawl
Protocols
protocol verification
probability
privacy
policy-based collaboration
Complexity theory
nonsatisfiability problem
monadic first order logic
matching lower bound
Indistinguishability
formal logic
encryption
Electronic mail
Cryptographic Protocols
coNEXPTIME
computational complexity
computability
Compositionality
biblio
Parameter selection for swarm intelligence algorithms \#x2014; Case study on parallel implementation of FSS
Submitted by K_Hooper on Wed, 05/02/2018 - 10:37am
number-of-iterations
swarm intelligence algorithms
Swarm Intelligence
Sociology
Silicon
SI algorithms
search problems
pubcrawl
problem complexity
population size
parameter selection
parallel implementation
optimisation
complex optimization problems
Iterative methods
FSs
Frequency selective surfaces
Fish School Search
Fish
execution time
Correlation
computational intelligence
computational complexity
composability
Complexity theory
biblio
Bounding Laconic Proof Systems by Solving CSPs in Parallel
Submitted by grigby1 on Wed, 04/11/2018 - 2:43pm
Complexity theory
composability
Compositionality
constraint satisfaction problems
pubcrawl
semidefinite programming
theoretical cryptography
biblio
Methodology (N2FMEA) for the detection of risks associated with the components of an underwater system
Submitted by K_Hooper on Wed, 04/04/2018 - 9:51am
n2 approaches
Underwater vehicles
Underwater Networks
Telephone sets
security
Scalability
risk management
risk level
Resiliency
pubcrawl
Organizations
N2FMEA
belief networks
Metrics
Fuzzy logic
fault trees
fault diagnosis
failure mode
failure analysis
failure (mechanical)
Electronic mail
Complexity theory
complex underwater system
biblio
Complexity of Cyber Security Architecture for IoT Healthcare Industry: A Comparative Study
Submitted by grigby1 on Mon, 04/02/2018 - 12:55pm
Scalability
patient personal information
patient wellness information
personal health
privacy
pubcrawl
Read only memory
resilience
Resiliency
Medical services
security of data
Wearable devices
wearable IoT healthcare applications
wearables security
XC7Z030 - 3fbg676 FPGA device
Xilinx IP cores
Xilinx Zynq-7000
Healthcare
Algorithm design and analysis
Complexity theory
Cyber Attacks
cyber security architecture
Cyber-security
encryption
field programmable gate arrays
health care
AES
Human behavior
Internet of Things
IoT
IoT based healthcare devices
IoT healthcare industry
IP networks
medical information systems
biblio
Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
message passing
risk management
risk assessment
Resiliency
resilience
region graph
pubcrawl
Probabilistic logic
Metrics
attack graph
Measurement
Force
factor graph
Computers
composability
Complexity theory
belief propagation
attack graphs
biblio
A Novel Approach for Analysis of Attack Graph
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
network security
vulnerability assessment
transition graph
Servers
Security Metrics
security attack graphs
security administrators
security
Resiliency
resilience
pubcrawl
Protocols
Ports (Computers)
network vulnerabilities
network topology
network theory (graphs)
attack graph
network interconnectivities
network configurations
multihost multistage vulnerability analysis
Metrics
Markov processes
Markov model
IT network scenario
IT infrastructure system
interconnections
graph theory
cyber security
computer network security
composability
Complexity theory
attack graphs
biblio
Tracking the Bad Guys: An Efficient Forensic Methodology to Trace Multi-Step Attacks Using Core Attack Graphs
Submitted by grigby1 on Mon, 04/02/2018 - 12:51pm
pubcrawl
Metrics
multistep attacks
network forensic analysis
network privileges
network size
network targets
network theory (graphs)
network topologies
information retrieval
resilience
Resiliency
security
standard logical attack graphs
standards
summarised information retrieval
tools
core attack graph
attack graphs
attack paths
bad guys tracking
compact representation
complex networks
Complexity theory
composability
Computer crime
Algorithm design and analysis
core graphs
Digital Forensics
forensic evaluation threshold
forensic investigators
forensic methodology
Forensics
graph theory
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
next ›
last »