Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ICT systems
biblio
In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
integrated modelling language
UNIX operating systems
UNIX operating system
Unix
self-replicating malware
Resiliency
resilience
pwnPr3d modelling approach
pubcrawl
operating systems
Metrics
invasive software
Analytical models
ICT systems
hardware components
Hardware
cybersecurity analysis
computer security
computer architecture
composability
attack graphs
architectural cyber security analysis
Architectural Analysis
biblio
Cyber security operations centre: Security monitoring for protecting business and supporting cyber defense strategy
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
CyberSA
timing
system-on-chip
SoC
security of data
security monitoring
risk management
pubcrawl170109
Monitoring
Log Source
information and communications technology
ICT systems
HMG protective monitoring controls
Her Majestys Government
government data processing
analysis
cyber situational awareness
cyber security operations centre
Cyber Incident Response
cyber defense strategy support
CSOC Strategy
CSOC framework
CSOC Benefits & Challenges
CSOC
Correlation
Computer crime
business protection
business control
Business
biblio
Semi-synthetic data set generation for security software evaluation
Submitted by BrandonB on Thu, 04/30/2015 - 1:49pm
intrusion detection and prevention systems
virus infestation
Virtual machining
testing
synthetic data set generation
semisynthetic data set generation
self-learning intrusion detection systems
security software evaluation
security of data
scalable system behavior model
anomaly detection evaluation
Intrusion Detection
information and communication technology systems
ICT systems
ICT security systems
heuristic detection engines
Databases
Data models
data handling
Complexity theory