Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Conferences
biblio
A study on the fast system recovery: Selecting the number of surrogate nodes for fast recovery in industrial IoT environment
Submitted by grigby1 on Tue, 12/12/2017 - 1:21pm
machine learning
System recovery
surrogate nodes
Servers
sensors
Resiliency
regression analysis
pubcrawl
network servers
Algorithm design and analysis
IoT gateway
Internet of Things
Industrial IoT(IIoT)
industrial IoT environment
fast system recovery mechanism
Fast Recovery
Conferences
biblio
A Collective, Probabilistic Approach to Schema Mapping
Submitted by grigby1 on Tue, 12/12/2017 - 1:19pm
metadata
uncertainty handling
schema mapping optimization problem
Scalability
Resiliency
pubcrawl
probability
probabilistic reasoning techniques
probabilistic reasoning
Probabilistic logic
optimization
metadata-only approaches
Metadata Discovery Problem
metadata constraints
CMD
meta data
mapping selection
inference mechanisms
data structures
Data mining
Data engineering
Conferences
Compositionality
Companies
collective probabilistic schema mapping approach
collective mapping discovery
cognition
biblio
Detection of vulnerability scanning using features of collective accesses based on information collected from multiple honeypots
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Web search crawler
multiple honeypot
pattern classification
Ports (Computers)
pubcrawl
Resiliency
vulnerability detection
vulnerability scanning detection
Web crawling
Metrics
Web servers
Web Service
web services
Web site
Web sites
Web vulnerability
web-based attacks
features of collective accesses
classification
collective access feature
Compositionality
computer network security
Conferences
crawler classification
Crawlers
decoy Web honeypot
attack prevention
Google
Human behavior
Human Factors
information collection
Intrusion Detection
IP networks
malicious threat
biblio
Security policy checking in distributed SDN based clouds
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
security
network control separation
network topology
open systems
organizational security policy
Policy
policy-based governance
proof-of-concept prototype
pubcrawl
multitenant data center environment
security policies
security policy checking
security policy management
Software Defined Network
software defined networking
telecommunication network topology
Topology
control systems
centralized implementation
Cloud Computing
cloud computing environment
collaboration
computer centres
computer network security
Conferences
conflict free environment
application deployment
Cross Layer Security
cross-layer conflict
decentralized network management
distributed SDN based cloud
dynamic topology change
Governance
Government
biblio
A Framework for Generating User-and Domain-Tailored Security Policy Editors
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Policy specification
Vocabulary
user-tailored security policy editors
user-friendly
Usable Security
usable policy editors
unintended data leakage
Terminology
Stakeholders
specification paradigms
security policies
security of data
security
pubcrawl
policy-based governance
collaboration
policy languages
policy authors
Policy Administration Point
Policy
Natural languages
Government
Governance
Formal Specification
Facebook
error-prone specification
domain-tailored security policy editors
customization
Conferences
biblio
Adopting Strict Content Security Policy for XSS Protection
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Licenses
XSS protection
Web application flaw
Tutorials
security policies
security of data
script source
pubcrawl
Production
policy-based governance
Policy
collaboration
internet
Government
Governance
Google
Data protection
CSP
content-injection flaw
content security policy
Conferences
computer security
biblio
A Distributed Graph Database for the Data Management of IoT Systems
Submitted by grigby1 on Mon, 11/13/2017 - 11:50am
graph edge property
social computing
security
REST API
Resiliency
pubcrawl
middleware
IoT systems
IoT
Internet of Things
green computing
graph theory
Access Control
graph database operations
graph database
distributed system
distributed graph database
Distributed databases
data management
Conferences
composability
collaboration
application program interfaces
access protocol permissions
biblio
A Scalable Meta-Model for Big Data Security Analyses
Submitted by grigby1 on Fri, 11/03/2017 - 11:31am
network anomaly detection
Training data
sufficient statistics
statistical data models
security of data
security analyses
security
Scalable Security
scalable meta-model
Scalability
regression analysis
pubcrawl
Predictive models
Big Data
meta-model sufficient statistics
meta-model matrix
Meta-Model
matrix algebra
machine learning algorithms
linear regressions
linear regression models
linear regression
learning (artificial intelligence)
Data models
Conferences
Big Data security analysis
biblio
Temporal analysis of radical dark web forum users
Submitted by grigby1 on Fri, 11/03/2017 - 11:29am
post polarity
temporal analysis
social networking (online)
Social network services
social media sites
sentiment analysis program
sentiment analysis
radical users
radical scores
radical dark Web forum users
radical actions
pubcrawl
POS tagger
Terrorism
internet
Data mining
dark web
Conferences
security of data
Human Factors
natural language processing
Human behavior
biblio
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
IP networks
target services
Servers
Resiliency
Relays
pubcrawl
proxy-based architectures
proxy harvesting attack
Network reconnaissance
moving target defense approach
malicious client isolation
malicious client discovery
attacker reconnaissance effort
high-profile targets
end users
distributed denial of service attacks
DDoS attack mitigation
Conferences
computer network security
Computer crime
Communication networks
client-to-proxy assignment strategy
client shuffling
client remapping
« first
‹ previous
…
73
74
75
76
77
78
79
80
81
next ›
last »