Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Analytical models
biblio
Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks
Submitted by grigby1 on Tue, 02/18/2020 - 11:05am
security
performance trade-offs
Probes
Protocols
pubcrawl
realistic evaluation
Reconnaissance
resilience
Resiliency
Scalability
performance overhead
security benefit
security techniques
Servers
Software Defined Network
software defined networking
Software Defined Networks
virtualisation
virtualised network
Moving Target Defence
comparison techniques
computer network security
Damage Assessment
flexible random virtual IP multiplexing
frequent address mutation
FRVM
IP multiplexing moving target defence
IP networks
Metrics
Analytical models
moving target defence technique
moving target defense
MTD techniques
Multiplexing
network attacks
network configurations
Network reconnaissance
Performance
biblio
An Attack Vector Evaluation Method for Smart City Security Protection
Submitted by grigby1 on Mon, 02/17/2020 - 4:08pm
pubcrawl
weakness
vulnerability assessment
Vulnerability
Software
smart city security protection
smart cities
simulation
security weaknesses
security of data
security
risk management
Resiliency
resilience
quantitative evaluation method
Analytical models
policy-based governance
network security risk assessment
Metrics
Human behavior
formal representation
edge computing
depend conditions
defense factors
critical information infrastructure
Conferences
Big Data
Attack vectors
attack vector evaluation method
attack vector
biblio
An Extensive Formal Security Analysis of the OpenID Financial-Grade API
Submitted by grigby1 on Mon, 02/17/2020 - 4:07pm
Security-Protocols
OpenID Financial-grade API
OpenID Foundation
OpenID-Connect
policy-based governance
pubcrawl
resilience
Resiliency
security weaknesses
Open-banking-API
Servers
Single-Sign-On
standards
Web Infrastructure Model
web services
web-based APIs
web-based environment
web-security
formal security analysis
application program interfaces
authentication
authorisation
authorization
bank data processing
Banking
FAPI
Financial-grade-API
Analytical models
Formal-Analysis
Human behavior
Metrics
OAuth
OAuth 2.0 design
Open Banking APIs
Open Banking security profile
biblio
Model for Study of Malware Propagation Dynamics in Wireless Sensor Network
Submitted by aekwall on Mon, 02/17/2020 - 1:35pm
Wireless Sensor Network
Susceptible-Exposed-Infectious-Recovered-Dead model
Propagation
neighboring sensor nodes
malware status
malware spread
malware propagation dynamics
malicious signals presence
Grippers
Equilibrium points
epidemiology basic reproduction number
Epidemic model
early detection method
critical security challenges
computer viruses
WSN
telecommunication security
security mechanism
Stability analysis
sensor security
detection
Analytical models
Metrics
Computational modeling
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
invasive software
malware
biblio
Decision Support System for Risk Assessment Using Fuzzy Inference in Supply Chain Big Data
Submitted by grigby1 on Mon, 01/27/2020 - 11:34am
risk assessment
Metrics
organisation Big Data collection
organisational aspects
policy-based governance
production engineering computing
pubcrawl
resilience
Resiliency
mamdani fuzzy inference
risk Identification
risk management
Scalability
supply chain Big Data
supply chain management
supply chain risk assessment
supply chains
Fuzzy Inference DSS mechanism
Big Data
collaboration
composability
Decision Making
decision support system
Decision support systems
emerging association patterns
FIDSS mechanism
Analytical models
Fuzzy logic
fuzzy reasoning
fuzzy set theory
Fuzzy sets
Human behavior
Human Factors
inference mechanisms
biblio
Assessing the Security Risks of Multicloud SaaS Applications: A Real-World Case Study
Submitted by grigby1 on Mon, 01/27/2020 - 11:33am
Scalability
privacy concerns
pubcrawl
Quantitative risk assessment
resilience
Resiliency
risk assessments
risk management
SaaS
policy-based governance
security
security risks
Software as a service
Supply Chain
supply chain risk assessment
supply chain-inclusive risk assessment model
supply chains
transparency
composability
case study
cloud
Cloud Computing
cloud computing services
cloud risks
cloud service providers
cloud supply chain cyber risk assessment model
collaboration
Analytical models
computing industry
CSCCRA model
data privacy
dynamic supply chain
Human behavior
Human Factors
Metrics
multicloud SaaS application
biblio
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Submitted by aekwall on Mon, 01/20/2020 - 11:05am
network reachability
attack tree
client-side attack
enterprise networks risk measurement
host based vulnerability scan
intrusion prevention system
modeling modern network attack
NetSPA attack graph system
network defense
attack graph
personal firewall
point-to-point reachability algorithm
protection
proxy firewall
reverse reachability computation
SCAP
zero-day exploit
Zero Day Attacks and Defense
risk management
authorisation
Resiliency
pubcrawl
composability
graph theory
Computational modeling
reachability analysis
Analytical models
computer network security
computer security
military computing
Laboratories
computer networks
Predictive Metrics
Computer worms
Application software
biblio
Hardware-Oriented Algebraic Fault Attack Framework with Multiple Fault Injection Support
Submitted by aekwall on Mon, 01/20/2020 - 11:00am
Hardware
tools
security-critical hardware implementations
Scalability
Resiliency
pubcrawl
Post /Pre silicon analysis
multiple fault injection support
Mathematical model
Lightweight Ciphers
lightweight block ciphers
Integrated circuit modeling
idealized fault models
hardware-oriented structural cipher descriptions
hardware-oriented framework
hardware-oriented algebraic fault attack framework
actual implementation
framework
field-programmable gate array platform
field programmable gate arrays
fault injector
Fault injction attack
Cryptography
conjunctive normal form clauses
Circuit faults
Ciphers
cipher implementations
Cipher
Analytical models
algebraic fault attack tool
algebraic equations
algebra
biblio
Deep in the Dark - Deep Learning-Based Malware Traffic Detection Without Expert Knowledge
Submitted by grigby1 on Thu, 01/02/2020 - 1:41pm
machine learning-based systems
Training
telecommunication traffic
Scalability
robust network security systems
raw-traffic feature representations
Raw Measurements
pubcrawl
privacy
pattern classification
networking attacks
network traffic
network security applications
malware network traffic
malware detection
malware
Expert Systems and Privacy
learning (artificial intelligence)
invasive software
Human Factors
feature extraction
expert systems
expert handcrafted features
deep learning-based malware traffic detection
deep learning models
deep learning
Data models
computer network security
computer architecture
classification
Analytical models
Human behavior
biblio
Understand Code Style: Efficient CNN-Based Compiler Optimization Recognition System
Submitted by aekwall on Mon, 12/02/2019 - 11:07am
recurrent neural nets
compiler security
understand code style
RNN-based model
optimising compilers
compiler optimization algorithms
CNN-based compiler optimization recognition system
CNN-based compiler optimization level recognition model
closed source compilers
binary security analysis
binary file processing
Compositionality
Semantics
security of data
convolution
Analytical models
convolutional neural nets
optimization
Metrics
pubcrawl
Resiliency
Task Analysis
Software
security
Scalability
« first
‹ previous
…
28
29
30
31
32
33
34
35
36
…
next ›
last »