Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Analytical models
biblio
Vulnerability analysis of power systems during the scheduled maintenance of network facilities
Submitted by grigby1 on Mon, 11/27/2017 - 11:24am
power system planning
Vulnerability Analysis
time-phased model
system operators
Smart Grids
single level MILP problem
scheduled network facilities maintenance
scheduled facility outages
Resiliency
Reliability
pubcrawl
power system vulnerability analysis
power system reliability
Analytical models
power grid vulnerability analysis
mixed-integer linear programming
Metrics
Mathematical model
maintenance engineering
Linear programming
Interdiction
integer programming
IEEE 24-bus RTS
IEEE 24-bus reliability test system
facility outage scheduling
composability
biblio
Balancing Data Security and Blocking Performance with Spectrum Randomization in Optical Networks
Submitted by grigby1 on Mon, 11/13/2017 - 10:55am
optical fibre networks
Time Frequency Analysis
telecommunication security
spectrum randomization
spectrum fragmentation
spectrum allocation proactive randomization
security
Scalability
RP arrival rate
resource management
Resiliency
randomization process arrival rate
random-fit spectrum allocation method
random reallocation fragment
Radio frequency
pubcrawl
Analytical models
Optical fiber networks
on-demand defragmentation scheme
occupancy pattern model
multiclass continuous-time Markov chain
Metrics
Markov processes
EOL
elastic optical networks
elastic optical link
data security improvement
data security balancing
data randomization
Data models
CTMC
connection security
biblio
Securing a Deployment Pipeline
Submitted by grigby1 on Wed, 03/08/2017 - 1:30pm
Analytical models
continuous deployment
deployment pipeline security
DevOps
engineering process
Permission
Pipelines
pubcrawl170112
security of data
Software
Supply Chain
supply chains
trusted components
Trusted Computing
biblio
Global adversarial capability modeling
Submitted by grigby1 on Tue, 03/07/2017 - 12:43pm
Analytical models
Androids
Biological system modeling
CND
Computational modeling
computer network defense
Cybersecurity
Humanoid robots
Incident Response
Integrated circuit modeling
intelligence
Intrusion Detection
modeling
pubcrawl170109
security
Software systems
biblio
Scalable Security Event Aggregation for Situation Analysis
Submitted by grigby1 on Tue, 03/07/2017 - 12:43pm
scalable security event aggregation
on-demand aggregation
parallel processing
pattern clustering
performance evaluation
periodic aggregation
pubcrawl170109
query languages
query support
large-scale data processing
SEAS-MR
security
security analytics
Security event aggregation
security event aggregation system over MapReduce
sensors
situation analysis
stealthy hacking processes
Computer crime
Aggregates
Analytical models
APT
attack methodologies
Big Data
big-data analytics
big-data computing
big-data security analytics
advanced persistent threats
Computers
cyber-attacks
data analysis
Data processing
Database languages
Hadoop cluster
high-level query languages
large-scale data analysis
biblio
Using Dynamic Taint Approach for Malware Threat
Submitted by grigby1 on Tue, 03/07/2017 - 12:40pm
pubcrawl170109
Information Flow
intersuspicious modules
invasive software
malware
Malware behavioural analysis
malware infection
malware threat analysis
network threats
FSM
Servers
suspicious apps
taint checking tools
taint marking
threat analysis
trees (mathematics)
weighted spanning tree analysis scheme
Computer hacking
Android programs
attack sequence
behavioural analysis
cloud applications
Cloud Computing
cloud computing server
Computational modeling
Computer crime
Analytical models
cyber security attack
data tracking
defence capability
Dynamic taint propagation
dynamic taint propagation analysis model
finite state machine
finite state machines
biblio
Digital Forensic analysis for enhancing information security
Submitted by grigby1 on Tue, 03/07/2017 - 12:40pm
Digital Forensics
pubcrawl170109
privacy
operating systems
information security enhancement
information security
image integrity
image acquisition
forensics science
forensic evidence
Analytical models
digital forensic analysis
digital forensic
digital crime scenario
data analysis
Cyberspace
Computers
antiforensic tool
antiforensic analysis
anti-digital forensic
biblio
Bipartite network model for inferring hidden ties in crime data
Submitted by grigby1 on Tue, 03/07/2017 - 12:30pm
hidden ties inference
vertex level metrics
underground forum data
underground forum
structural analysis
standard network algorithm
Social network services
security of data
relationship mapping
pubcrawl170109
pharmaceutical crime
organised criminal network
network analysis
Measurement
law enforcement
Algorithm design and analysis
group identification
disruption strategies
Data mining
cyber criminals
criminal networks
criminal group structural organisation
criminal datasets
crime data
community structure
community analysis
bipartite network model
bipartite network
Artificial Intelligence
Analytical models
biblio
Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritize Threats to Systems
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
modelling
user security attribute preference
threat modelling
system threat prioritization
security of data
security
risk management
pubcrawl170108
pubcrawl170107
propagation analysis
Analytical models
graph theory
graph model
Data models
controls and orderings for vulnerabilities and exposures model
Computational modeling
Cloud-COVER model
cloud security threat modelling tool
Cloud Computing
biblio
"Beyond gut instincts: Understanding, rating and comparing self-learning IDSs"
Submitted by abfox on Tue, 02/14/2017 - 12:52pm
Data models
self-learning IDS
security of data
Safety
pubcrawl170101
Organizations
Intrusion Detection Systems
Intrusion Detection
ICT networks
economy vital backbone
advanced persistent threat
Cyber Attacks
customer network data
customer infrastructures
Complexity theory
BAESE system
APT
Analytical models
advanced persistent threats
« first
‹ previous
…
34
35
36
37
38
39
40
41
42
next ›
last »