Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ports (Computers)
biblio
A Novel Approach for Analysis of Attack Graph
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
network security
vulnerability assessment
transition graph
Servers
Security Metrics
security attack graphs
security administrators
security
Resiliency
resilience
pubcrawl
Protocols
Ports (Computers)
network vulnerabilities
network topology
network theory (graphs)
attack graph
network interconnectivities
network configurations
multihost multistage vulnerability analysis
Metrics
Markov processes
Markov model
IT network scenario
IT infrastructure system
interconnections
graph theory
cyber security
computer network security
composability
Complexity theory
attack graphs
biblio
Artificial Neural Network Based IDS
Submitted by grigby1 on Mon, 04/02/2018 - 12:40pm
nonmalicious communication
UDP flood attack
telecommunication traffic
SYN flood attack
standards
signature based NIDS
sensors
security of data
Resiliency
resilience
pubcrawl
Ports (Computers)
policy-based governance
anomaly based neural network intrusion detection system
NNIDS
nMap scanning attack
neural nets
network intrusion detection systems
Metrics
Intrusion Detection
digital signatures
Databases
Artificial Neural Networks
artificial neural network based IDS
anomaly based NIDS
biblio
Overview of Firewalls: Types and Policies: Managing Windows Embedded Firewall Programmatically
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
Protocols
network security
Open Port
operating systems (computers)
Packet
Packets filtering
Ports (Computers)
preconfigured rules
private networks
network attacks
pubcrawl
resilience
Resiliency
security
Windows
Windows embedded firewall
Windows operating system
firewalls
composability
computer network security
computer security
Filtering
firewall
Firewall Exception
firewall policies
firewall rules
Authorize Application
Firewalls (computing)
firewalls types
internet
IP networks
Metrics
microsoft windows
Network
biblio
Self-Healing Router Architecture for Reliable Network-on-Chips
Submitted by grigby1 on Mon, 03/05/2018 - 1:21pm
Circuit faults
composability
computer architecture
Evolvable hardware
Fault Tolerant
Hardware
NoCs
Ports (Computers)
pubcrawl
Redundancy
resilience
Resiliency
Routing
self-healing
self-healing networks
biblio
Moving Target Defense Intrusion Detection System for IPv6 based smart grid advanced metering infrastructure
Submitted by K_Hooper on Wed, 02/28/2018 - 11:39am
Ports (Computers)
Training
static based attack detection techniques
smart power grids
smart meters
Smart Grids
smart grid IPv6 based advanced metering infrastructure
smart grid communications
smart grid advanced metering infrastructure
Smart Grid
security of data
Routing
Resiliency
pubcrawl
power system measurement
collaboration
Planar Key
object detection
network traffic
moving target defense intrusion detection system
moving target defense
Metrics
MATLAB
ipv6 security
IP networks
Intrusion Detection Systems
Intrusion Detection
Difference Plane
composability
biblio
Provable security analysis of complex or smart computer systems in the smart grid
Submitted by grigby1 on Wed, 02/21/2018 - 1:50pm
smart computer systems
power engineering computing
power system security
provable security analysis
pubcrawl
Radiation detectors
resilience
Resiliency
Scalability
security of data
simple promela interpreter
Ports (Computers)
Smart Grid
smart grid security
smart power grids
smart system
SPIN
Temporal Logic
temporal logics
Transition System
TS
Formal Specification
access control mechanism
ACM
authorisation
automata
automata theory
Büchi Automaton
computer security
formal security
formal security analysis
provable security
formal verification
FSA
Linear Temporal Logics
LTL
Mathematical model
Metrics
model checking
operating system
OS
biblio
Multiple fault diagnosis in analog circuits using the indirect compensation theorem
Submitted by grigby1 on Thu, 02/15/2018 - 11:46am
public domain software
linear subcircuits
Metrics
multiple fault diagnosis
multiple faults diagnosis techniques
multiport networks
nullor
parameter estimation
Ports (Computers)
pubcrawl
linear network analysis
resilience
Resiliency
symbolic analysis
symbolic analysis process
symbolic circuit analysis
Topology
two-port network
Voltage measurement
equivalent circuits
Analog circuits
analogue circuits
circuit analysis computing
circuit determinant expressions
Circuit faults
circuit simulation
Cirsym freeware computer program
Current measurement
analog circuit diagnosis
fault diagnosis
generalized parameter extraction method
Human behavior
human factor
Human Factors
indirect compensation theorem
linear analog circuits
linear models
biblio
Payload recognition and detection of Cross Site Scripting attack
Submitted by grigby1 on Thu, 02/15/2018 - 11:44am
payload recognition
XSS attack
Web Application Security
testing
Servers
security of data
security
Scalability
Resiliency
resilience
regular expression pattern matching
regular expression
pubcrawl
preprocessing method
Ports (Computers)
Payloads
coding practices
Pattern recognition
OWASP
Open Web Application Security Project
NIDS
IP networks
internet
Human Factors
human factor
Human behavior
HTML
data payload
cross site scripting attack detection
Cross Site Scripting (XSS)
Cross Site Scripting
biblio
Leverage Intrusion Detection System Framework for Cyber Situational Awareness System
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
Metrics
tools
threat
situational awareness
security
Resiliency
pubcrawl
Ports (Computers)
Organizations
Network
attack
Measurement
intrusion detection system
GUI
framework
Decision Making
Cyberspace
cyber situational awareness system
composability
biblio
SDN Security Plane: An Architecture for Resilient Security Services
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
SDN security plane
pubcrawl
real-time user-defined security
remotely controlled network
Resiliency
Resilient Security Architectures
resilient security services architecture
SDN
SDN controller
SDN security design
Proposals
SDN switches
Security plane
security-related data exchange
software defined networking
telecommunication control
telecommunication switching
third party agent
third party software module
data plane
centralised control
centralized control
computer architecture
Computer crime
computer network performance evaluation
computer network security
control plane
control systems
data packet forwarding
Agent
DDoS Attack Prevention
DDoS Attacks
IP networks
network communications
network performance
network security features
OpenFlow
Ports (Computers)
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »