Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Linux
biblio
Studying Naive Users and the Insider Threat with SimpleFlow
Submitted by grigby1 on Tue, 05/30/2017 - 12:45pm
composability
Information Flow
insider threat
Linux
linux operating systems security
linux security module
Metrics
operating system security
pubcrawl
Resiliency
biblio
Anonymous port scanning: Performing network reconnaissance through Tor
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
Network reconnaissance
Tor
scanning processes
scanning
scan rate
Resiliency
Reconnaissance
pubcrawl
Ports (Computers)
Nmap
Acceleration
Network interfaces
Management information systems
Linux
IP networks
internet
computer communications software
anonymous port scanning
anonymizing port scanning tools
anonymization
biblio
Analysis of UDP DDoS flood cyber attack and defense mechanisms on Web Server with Linux Ubuntu 13
Submitted by grigby1 on Tue, 03/07/2017 - 1:38pm
Linux
Web servers
Web server
UDP DDoS flood cyber attack
transport protocols
Throughput
threshold limit
TCP throughput
security problems
round-trip time
reverse path forwarding
pubcrawl170109
network load balancing
Linux Ubuntu 13
Linux platform
access control lists
IP verify
IP networks
Internet world
internet
Floods
file servers
distributed denial of service attacks
defense mechanisms
CPU utilization
Computers
computer network security
Computer crime
authorisation
ACL
biblio
Analysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
threshold limit
network load balancing
pubcrawl170109
resource allocation
reverse path forwarding
round-trip time
security problems
Servers
TCP throughputs
Load management
threshold limit defense
Throughput
transport protocols
UDP DDoS Attack
UDP DDoS cyber flood attack
Windows Server 2012
Windows Sever 2012
access control lists
Linux Ubuntu 13
Linux
IP verify
IP networks
Internet world
internet
Floods
file servers
distributed denial of service attacks
defense mechanisms
cyber security
CPU utilization
computer network security
Computer crime
ACL
biblio
Analyzing the Impact of Feature Changes in Linux
Submitted by grigby1 on Tue, 03/07/2017 - 1:12pm
CADOS
Configurability
Kconfig
Linux
pubcrawl170201
biblio
"Linux XIA: an interoperable meta network architecture to crowdsource the future internet"
Submitted by grigby1 on Tue, 02/21/2017 - 12:24pm
Meta network architecture
zFilter
XIA
TCP/IP
Serval
Runtime
Routing
pubcrawl170103
Protocols
open systems
network evolution
missing catalyst
broader community
Linux XIA
Linux kernel
Linux
Kernel
IP networks
interoperable meta network architecture
interoperability
Internet architecture
internet
future Internet architecture
disparate architectures
biblio
"Towards dependable CPS infrastructures: Architectural and operating-system challenges"
Submitted by abfox on Tue, 02/14/2017 - 2:33pm
advanced persistent threat
computer architecture
CPS infrastructure
cyber-physical system
cyber-physical systems
Kernel
Linux
operating systems (computers)
operating-system level
pubcrawl170101
rudimentary solution
security
security of data
Virtual private networks
biblio
Operating system security by integrity checking and recovery using write-protected storage
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
buffering mechanism
cryptographic hashes generation
database management systems
file backups
file system integrity
hashes database
ICAR system binaries
integrity checking and recovery system
Linux
Linux security model
security constraints
security database management
security of data
system security
unauthorised modification
write-protected storage
biblio
Open science, open security
Submitted by BrandonB on Tue, 05/05/2015 - 11:43am
Linux
security of data
security
production quality tools
Production
parallel processing
open security
open science
Materials
data representation
Intrusion Detection
HPC security
High performance computing
Filtering
data selection
Buildings
computer architecture
data analysis
biblio
Scalable Security Models for Assessing Effectiveness of Moving Target Defenses
Submitted by BrandonB on Tue, 05/05/2015 - 11:16am
internet
security of data
Security Modeling Techniques
security assessment
Security analysis
security
scalable security models
networked system security
MTD
moving target defenses
moving target defense
Measurement
Linux
Analytical models
IMs
importance measures
hierarchical attack representation models
HARMs
graph theory
exhaustive search method
effectiveness assessment
Diversity methods
Computational modeling
Attack Representation Model
attack graphs
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »