Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Conferences
biblio
Moving target defense for securing smart grid communications: Architecture, implementation evaluation
Submitted by grigby1 on Tue, 01/16/2018 - 6:31pm
smart grid communications
power grid SCADA environment
power system security
privacy
pubcrawl
realistic environment
Resiliency
SCADA communications
SCADA system
SCADA systems
security of data
port mutation
smart power grids
sophisticated cyber-attacks
static system characteristics
supervisory control and data acquisition
target system
targeted cyber-attacks
Throughput
throughput characteristics
trusted peers
end-to-end IP-Hopping technique
attacker
CI
Communication Network
computer network security
computer security
Conferences
critical infrastructure
critical infrastructures
data acquisition
attack complexity
hopping rates
Iowa State PowerCyber
IP-Hopping
Logic gates
Manganese
Metrics
moving target defense
Moving Target Defense strategy
MTD Architecture
biblio
Interactive message transmission over adversarial wiretap channel II
Submitted by grigby1 on Wed, 01/10/2018 - 12:20pm
Scalability
Policy
Protocols
pubcrawl
public key infrastructure
quantum computers
Random variables
Reliability
Resiliency
perfectly secure protocol family
security
telecommunication security
two-way wiretap II channel
Upper bound
wireless channels
wireless setting
Wyner wiretap II model
information theoretic security
adversarial noise
adversarial wiretap channel II
collaboration
composability
Conferences
Cryptographic Protocols
Human behavior
human factor
active adversary
interactive message transmission
interactive protocols
Jamming
jamming signal
Metrics
Mobile communication
perfect information theoretic security
biblio
TextDroid: Semantics-based detection of mobile malware using network flows
Submitted by K_Hooper on Wed, 01/10/2018 - 11:15am
Conferences
feature extraction
Human behavior
malware
Mobile communication
mobile computing
natural language processing
pubcrawl
Resiliency
Scalability
security
Support vector machines
biblio
Towards provisioning of SDN/NFV-based security enablers for integrated protection of IoT systems
Submitted by grigby1 on Thu, 12/28/2017 - 1:40pm
Monitoring
Virtualization
standards
software defined networking
security scalability
SDN/NFV-based security features
Scalability
pubcrawl
open-source SDN/NFV projects
authentication
low-cost end-user devices
IoT
Internet of Things
cybersecurity attacks
Conferences
computer network security
Cloud Computing
biblio
Science DMZ: SDN based secured cloud testbed
Submitted by grigby1 on Thu, 12/28/2017 - 1:36pm
Policy-Governed Secure Collaboration
visualization
software defined networking
Servers
security
Science of Security
Scalability
Resiliency
pubcrawl
Cloud Computing
Metrics
Logic gates
Human Factors
Human behavior
Conferences
composability
collaboration
biblio
Accountability in cyber-physical systems
Submitted by grigby1 on Thu, 12/28/2017 - 1:34pm
Human Factors
Watermarking
security of data
Science of Security
Scalability
Robustness
responsibility-assignment
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
Metrics
Kullback-Liebler divergence
Attack detection
Human behavior
cyber-physical systems
cyber-physical system
CPS accountability
corrective measures
control systems
Conferences
composability
collaboration
causal information flow analysis
Casting
biblio
Decomposition method for complex target RCS measuring
Submitted by grigby1 on Thu, 12/28/2017 - 1:17pm
Metrics
Shape
RCS measurements
RCS
radar detectability
Radar cross-sections
radar antennas
pubcrawl
object RCS
natural measurements
monostatic RCS
average RCS
field zone
decomposition method
decomposition
Conferences
Compositionality
complex target RCS
complex target
complex shaped objects
complex shape object
biblio
Active Dependency Mapping: A Data-Driven Approach to Mapping Dependencies in Distributed Systems
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Ecosystems
Software
security
Robustness
Resiliency
Resilience and Robustness
resilience
quantitative assessment
pubcrawl
network performance
network environment
Mission Assurance
interrelated software services
Information Reuse
enterprise networks
Active dependency mapping
distributed systems
distributed processing
dependency relations
dependency analysis
Degradation
Data-driven approach
cyber-physical systems
cyber physical systems
Cyber Dependencies
Conferences
computer security
Automated Dependency Mapping
artificial degradation
biblio
SuperMan: A Novel System for Storing and Retrieving Scientific-Simulation Provenance for Efficient Job Executions on Computing Clusters
Submitted by grigby1 on Tue, 12/12/2017 - 1:27pm
Metrics
SuperMan
storage management
SimUlation ProvEnance Recycling MANager
simulation
scientific-simulation provenance storage
scientific-simulation provenance retrieval
scientific information systems
scientific computing
Resiliency
Recycling
pubcrawl
Provenance
PROV
open systems
composability
job executions
interoperability
information retrieval
Human Factors
Human behavior
HPC
EDISON
digital simulation
Data models
Conferences
computing clusters
compute-intensive simulations
Computational modeling
Compositionality
biblio
A new multi-proxy multi-signature scheme based on elliptic curve cryptography
Submitted by grigby1 on Tue, 12/12/2017 - 1:24pm
computer science
Conferences
digital signatures
Elliptic curve cryptography
Elliptic curves
Metrics
multi-proxy
multi-signature
pubcrawl
Resiliency
Scalability
« first
‹ previous
…
73
74
75
76
77
78
79
80
81
next ›
last »