Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Engines
biblio
An Efficient Memory Zeroization Technique Under Side-Channel Attacks
Submitted by aekwall on Mon, 02/24/2020 - 10:55am
built-in self test
volatile memories
side-channel attacks
Side-channel attack
security violations
secured data content
secret data
random-access storage
private memory contents
on-chip memory contents
Memory Zeroization
memory security
memory built-in-self-test hardware
MBIST based content zeroization approach
efficient memory zeroization technique
content protection
security of data
Temperature sensors
cryptographic keys
remanence
Compositionality
Engines
Random access memory
data deletion
security attacks
pubcrawl
Resiliency
system-on-chip
security
Memory management
Hardware
Cryptography
biblio
Research and Implementation of Intelligent Substation Information Security Risk Assessment Tool
Submitted by aekwall on Mon, 02/17/2020 - 2:28pm
Metrics
tools
Task Analysis
Substations
substation automation
Security Risk Management
security of data
risk management
risk assessment tool
risk assessment platform
risk assessment engine
pubcrawl
Protocols
power system security
Intelligent Data and Security
intelligent substation information security risk assessment tool
intelligent substation
information security level
information security assessment method
information security
Industrial Control Systems
industrial control
Engines
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
Secure Integration of Electric Vehicles with the Power Grid
Submitted by aekwall on Mon, 02/10/2020 - 12:06pm
power data
cyber-physical
cyber-physical anomaly detection Engine
detects anomalies
distribution networks
EV
monitoring cyber messages
monitors system behavior
pluggable electric vehicles
critical power grid component
power grid system
Power measurement
power measurements
V2G cyber network
Vehicle-to-grid
vehicle-to-grid system
worst case inspection time
Smart Grid Sensors
Inspection
Monitoring
security
Resiliency
pubcrawl
Protocols
Anomaly Detection
distributed energy resources
power system security
Intrusion Detection
distributed power generation
secure integration
Engines
Human Factors
Compositionality
Electric Vehicles
aggregator
battery powered vehicles
biblio
Securing Machine Learning Engines in IoT Applications with Attribute-Based Encryption
Submitted by grigby1 on Tue, 01/28/2020 - 2:38pm
machine learning
testing
Servers
security system
security risks
search engines
Scalability
Resiliency
resilience
pubcrawl
privacy
policy-based governance
Pairing Encryption
machine learning transactions
machine learning engines
attribute-based encryption
low time consumption
learning (artificial intelligence)
IoT applications
Internet of Things
internal machine learning architecture
Human behavior
Engines
Cryptography
CP-ABE
computer network security
Computational modeling
computation process
composability
biblio
A Symptomatic Framework to Predict the Risk of Insider Threats
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
Insider Threat Scoring Engine (ITSE)
collaboration
Critical assets
critical infrastructure
critical infrastructure organisation
critical infrastructures
Engines
Human behavior
information security
information security threats
insider threat
insider threat events
insider threat framework for Namibia critical infrastructure organization
tools
Interviews
ITFNACIO
Metrics
policy-based governance
pubcrawl
resilience
Resiliency
risk management
security of data
symptomatic analysis
Symptomatic Analysis (SA)
symptomatic insider threat risk assessment framework
biblio
Research and Design of Subway BAS Intrusion Detection Expert System
Submitted by grigby1 on Thu, 01/02/2020 - 2:45pm
Public transportation
urban rail transit system
the inference engine
targeted intrusion detection expert system
subway equipment
subway BAS intrusion detection expert System
security of data
security
Scalability
Resiliency
resilience
railways
rail transit system
rail traffic
Rails
Building automation system
pubcrawl
knowledge base
intrusion detection system
Intrusion Detection
information security
inference mechanisms
inference engine
Human behavior
expert systems
expert system
Engines
cognition
building management systems
biblio
Research and Implementation of Cross-site Scripting Defense Method Based on Moving Target Defense Technology
Submitted by aekwall on Mon, 12/16/2019 - 2:17pm
moving target defense technology
XSS defense method
Web pages
Web application
security of data
security check function
Scalability
resilience
Reactive power
random processes
random attribute
pubcrawl
programmable logic arrays
online front-ends
MTD
authoring languages
moving target defense
JavaScript engine
JavaScript code
Java
internet
hypertext markup language
hypermedia markup languages
Human behavior
HTML
Engines
cross-site scripting attack
cross-site scripting
Cross Site Scripting
Browsers
biblio
Considerations on the Adoption of Named Data Networking (NDN) in Tactical Environments
Submitted by grigby1 on Thu, 12/05/2019 - 10:52am
Resiliency
NDN
node mobility
performance tuning
Policy
Policy Based Governance
policy governance
practical adoption
Protocols
pubcrawl
resilience
Named Data Networking (NDN)
stable connections
tactical applications
tactical edge networks
tactical environments
tactical networks
transport protocols
unreliable capacity limited performance
wireless nature
wireless sensor networks
ICN
application-specific extensions
clean slate
clean slate networking approach
collaboration
communication scenario
Engines
Face
fairly stable infrastructure-based environments
Human behavior
Human Factors
Ad hoc networks
information centric networking
Information-Centric Networking (ICN)
internet
IP networks
Metrics
military communication
mobile computing
mobile military networks
named data networking
biblio
Peapods: OS-Independent Memory Confidentiality for Cryptographic Engines
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
code fragments
compiler security
user-mode protection
Transactional memory
software engines
sensitive variables
Peapods
OS-independent memory confidentiality
memory disclosure attacks
memory disclosure attack
DRAM chips
cryptographic keys
Cryptographic Implementation
cryptographic engines
confidentiality
compiler
Scalability
automatic protection
program compilers
Registers
Compositionality
operating systems (computers)
Engines
Random access memory
OS kernel
Data protection
Metrics
pubcrawl
Resiliency
Kernel
encryption
Cryptography
biblio
Protecting Privacy with a Declarative Policy Framework
Submitted by aekwall on Mon, 11/11/2019 - 11:47am
privacy policy framework
formal verification
Human behavior
Ontologies
policy decision point
privacy
privacy enhancing technologies
Privacy Policies
privacy policy creation
privacy policy decision engine
privacy policy engine decisions
Formal Specification
privacy policy management
privacy policy validation
privacy protection
pubcrawl
Scalability
security of data
Semantics
technical details
user interfaces
Common Data Model
Resiliency
-Automated-reasoning
-Data-sharing
-Ontology
-Policy
-Policy-Decision-Engine
-Privacy-Framework
-Reasoning
-Rule
-Semantic-Technology
Computing Theory and Privacy
Cryptography
Data models
data privacy
Databases
declarative policy framework
Engines
enterprise privacy prototype system
expressive policy specification
formal shareability theory
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »