Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Analytical models
biblio
Towards a Methodology for Cybersecurity Risk Management Using Agents Paradigm
Submitted by BrandonB on Tue, 05/05/2015 - 11:28am
Agent Based Paradigm
agents paradigm
Analytical models
business continuity
computer security
cybersecurity risk management
Educational institutions
Informatics
proactive behavior
risk management
SA
security management systems
security of data
sensors
situational awareness
biblio
Scalable Security Models for Assessing Effectiveness of Moving Target Defenses
Submitted by BrandonB on Tue, 05/05/2015 - 10:16am
internet
security of data
Security Modeling Techniques
security assessment
Security analysis
security
scalable security models
networked system security
MTD
moving target defenses
moving target defense
Measurement
Linux
Analytical models
IMs
importance measures
hierarchical attack representation models
HARMs
graph theory
exhaustive search method
effectiveness assessment
Diversity methods
Computational modeling
Attack Representation Model
attack graphs
biblio
Effectiveness of Port Hopping as a Moving Target Defense
Submitted by BrandonB on Tue, 05/05/2015 - 10:12am
Analytical models
attacker success likelihood
Computers
moving target defense
network attacks
port hopping
Ports (Computers)
proactive defense
proactive defense technology
Probes
Reconnaissance
reconnaissance attack
security of data
Servers
service identity hiding
urn model
biblio
Static analysis approaches to detect SQL injection and cross site scripting vulnerabilities in web applications: A survey
Submitted by BrandonB on Tue, 05/05/2015 - 9:40am
SQLI
social communications
Software
software development life cycle
software maintenance
software reliability
source code
source code (software)
SQL
SQL injection
Servers
static analysi
static analysis
testing
vulnerabilitie
vulnerability detection
web applicatio
web applications
XSS
legacy Web applications
attack prevention
Cross Site Scripting
cross site scripting vulnerabilities
defensive programming
financial transaction
Guidelines
health problem
internet
Analytical models
malicious users
Manuals
program diagnostics
programming
programming mistakes
security of data
security vulnerabilities
security weaknesses
biblio
The design of cybercrime spatial analysis system
Submitted by BrandonB on Mon, 05/04/2015 - 1:39pm
GIS data-structure
Spatial databases
spatial analysis system
Spatial analysis
security of data
Monitoring
IP tracking technology
IP networks
Internet searching
internet
Analytical models
GIS
geographic information systems
Data models
cybercrime prevention strategy
cybercrime monitoring design
Cybercrime
correlative analysis model
Computer crime
biblio
An advancing investigation on reduct and consistency for decision tables in Variable Precision Rough Set models
Submitted by BrandonB on Mon, 05/04/2015 - 1:28pm
Electronic mail
β-consistent notion
β-complement reduct
VPRS model
variable precision rough set model
rough set theory
pattern classification
Mathematical model
majority inclusion relation mechanism
hidden classification ability
Fault tolerant systems
fault tolerance
Analytical models
Educational institutions
decision tables
decision table structures
decision table splitting algorithm
data reduction
data integrity
Computational modeling
classical RS model
classical rough set theory
attribution reduction problem
biblio
Who Wrote This? Textual Modeling with Authorship Attribution in Big Data
Submitted by BrandonB on Mon, 05/04/2015 - 1:22pm
textual modeling
multiple-author documents
Predictive models
Probabilistic topic models
receiver operating characteristic curve
ROC curve
SAT model
supervised author-topic model
text analysis
meta-data
topic representations
topic-based generative models
Training
unsupervised AT model
Unsupervised Learning
unsupervised learning technique
Vectors
Computational modeling
area under curve
AUC
author-topic model
authorship attribution
authorship learning
authorship prediction
Bayesian inference
Big Data
Analytical models
Data models
dimension reduction
Dirichlet distribution
High dimensional texual data
information discovery
Mathematical model
meta data
biblio
VANETsim: An open source simulator for security and privacy concepts in VANETs
Submitted by BrandonB on Mon, 05/04/2015 - 12:56pm
privacy
vehicular communications
Vehicular Communication
vehicular ad hoc networks
vehicles
VANETsim
VANET
Simulator
Security in Mobile and Wireless Networks
security
Roads
road safety
public domain software
Privacy-Enhancing Technology
Analytical models
open source simulator
mobile computing
Intrusion and Attack Detection
graphical user interfaces
graphical user interface
event-driven simulation platform
discrete event simulation
data privacy
Car2Car
application-level security implications
application-level privacy implications
anonymity
biblio
Modelling Analysis and Auto-detection of Cryptographic Misuse in Android Applications
Submitted by BrandonB on Mon, 05/04/2015 - 12:30pm
cryptographic misuse vulnerability model
Vulnerability
static analysis
Runtime
prototype tool crypto misuse analyser
program diagnostics
Modelling Analysis
Humanoid robots
encryption
Cryptography
Analytical models
cryptographic misuse autodetection
Cryptographic Misuse
cryptographic API
CMA
application program interfaces
Androids
Android application
Android (operating system)
android
biblio
An Open S-BPM Runtime Environment Based on Abstract State Machines
Submitted by BrandonB on Fri, 05/01/2015 - 7:10am
finite state machines
workflow management software
workflow engine
Subject-oriented Business Process Management
subject-oriented BPM
Semantics
S-BPM tools
S-BPM model
program interpreters
Open-S-BPM
Open S-BPM runtime environment
Mathematical model
abstract interpreter model
executable workflow engine
Engines
CoreASM
business process modeling
business data processing
Business
ASM approach
Analytical models
Abstracts
abstract state machine interpreter
Abstract State Machine
« first
‹ previous
…
34
35
36
37
38
39
40
41
42
next ›
last »