Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Complexity theory
biblio
Research on cloud computing complex adaptive agent
Submitted by BrandonB on Fri, 05/01/2015 - 7:12am
Adaptation models
adaptive systems
Business
CAS theoretical framework
Cloud Computing
cloud computing complex adaptive agent
cloud computing environment simulation
cloud computing system
cloud computing technology
complex adaptive system
Complexity theory
Computational modeling
Economics
information technology
multi-agent systems
service agent
biblio
A New Code Obfuscation Scheme for Software Protection
Submitted by BrandonB on Fri, 05/01/2015 - 6:57am
malicious reverse engineering
tampering
systems re-engineering
software protection
software engineering
Software
security attacks
reverse engineering
Resists
Resistance
nontrivial code clones
Cloning
Licenses
IT industry
Data processing
Computer crime
Complexity theory
code transformation
code patterns
code obfuscation scheme
code fragment cloning
biblio
Resilience Analysis of Power Grids Under the Sequential Attack
Submitted by BrandonB on Fri, 05/01/2015 - 6:36am
Power system protection
Substations
substation-transmission lines
sequential attack graph
sequential attack
resilience analysis
power transmission reliability
power transmission lines
power system security
Attack Strategies
power grids vulnerability
power grids
Power Grid Security
electrical service
Complexity theory
complexity analysis
catastrophic consequences
Cascading Failures
biblio
A trusted measurement scheme suitable for the clients in the trusted network
Submitted by BrandonB on Thu, 04/30/2015 - 1:21pm
network security threat
trusted network connection
trusted network
trusted measurement scheme
trusted computing field
Trusted Computing
trust measurement scheme
static measurement
state measurement
real-time systems
real-time state measurement
real-time measurement support
real-time measurement
polynomials
access control technology
message authentication
identity privacy
Gold
fine-grained states
fine-grained security policy
fine granularity
dynamic measurement
data privacy
Complexity theory
authorisation
authentication mechanism
authentication
Area measurement
biblio
Semi-synthetic data set generation for security software evaluation
Submitted by BrandonB on Thu, 04/30/2015 - 12:49pm
intrusion detection and prevention systems
virus infestation
Virtual machining
testing
synthetic data set generation
semisynthetic data set generation
self-learning intrusion detection systems
security software evaluation
security of data
scalable system behavior model
anomaly detection evaluation
Intrusion Detection
information and communication technology systems
ICT systems
ICT security systems
heuristic detection engines
Databases
Data models
data handling
Complexity theory
biblio
A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
Submitted by BrandonB on Thu, 04/30/2015 - 12:23pm
high-level programming languages
UNM data sets
system calls
semantic structure
security of data
Registers
program anomaly behaviour
operating systems (computers)
modern operating system
Logic gates
KDD98 data sets
Intrusion Detection
host-based IDS
host-based anomaly intrusion detection system design
ADFA-LD
high level languages
Gaussian processes
false alarm rates
discontiguous system call patterns
Cryptography
contiguous system call patterns
contemporary hacking methods
computer security
computer architecture
Complexity theory
Clocks
Anomaly Detection
biblio
A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
Submitted by BrandonB on Tue, 04/28/2015 - 12:06pm
high-level programming languages
UNM data sets
system calls
semantic structure
security of data
Registers
program anomaly behaviour
operating systems (computers)
modern operating system
Logic gates
KDD98 data sets
Intrusion Detection
host-based IDS
host-based anomaly intrusion detection system design
ADFA-LD
high level languages
Gaussian processes
false alarm rates
discontiguous system call patterns
Cryptography
contiguous system call patterns
contemporary hacking methods
computer security
computer architecture
Complexity theory
Clocks
Anomaly Detection
« first
‹ previous
…
18
19
20
21
22
23
24
25
26