Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Organizations
biblio
Complex Strategy against Supply Chain Attacks
Submitted by grigby1 on Tue, 12/21/2021 - 12:35pm
pubcrawl
zero trust
Zero day attacks
supply chains
Supply Chain
Software measurement
Software
security operation centre
Resiliency
resilience
army
Organizations
Metrics
History
defense
cyber-attack
Computer crime
composability
Communication Systems
communication and information systems protection
biblio
A Kubernetes CI/CD Pipeline with Asylo as a Trusted Execution Environment Abstraction Framework
Submitted by grigby1 on Mon, 12/20/2021 - 1:18pm
Kubernetes
Virtual machining
trusted execution environment (TEE)
Tekton
security
Resiliency
resilience
pubcrawl
Pipelines
Organizations
Metrics
Air gaps
Kaniko
Human behavior
Harbor
devsecops
continuous integration / continuous deployment (CI/CD)
Containers
Conferences
composability
Cloud Computing
Asylo
biblio
Feature Inference Attack on Model Predictions in Vertical Federated Learning
Submitted by aekwall on Mon, 12/20/2021 - 12:30pm
Human behavior
Adversary Models
vertical federated learning
privacy preservation
model prediction
feature inference attack
Collaborative Work
Radio frequency
Prediction algorithms
Organizations
Resiliency
Metrics
Scalability
pubcrawl
data privacy
Predictive models
Data models
biblio
An Approach on Attack Path Prediction Modeling Based on Game Theory
Submitted by aekwall on Mon, 12/20/2021 - 12:23pm
security
Organizations
Predictive models
Scalability
Analytical models
information technology
Games
pubcrawl
Metrics
Resiliency
Human behavior
game theory
advanced persistent threat
APT attack
game model
network defense framework
biblio
Toward Pinpointing Data Leakage from Advanced Persistent Threats
Submitted by aekwall on Mon, 12/20/2021 - 12:22pm
Human behavior
leakage auditing
fingerprint
Digital Forensics
data leakage
APT
advanced persistent threat
Forensics
Fingerprint recognition
Organizations
Resiliency
Metrics
pubcrawl
Databases
Conferences
Computer hacking
Scalability
Big Data
biblio
Deception Maze: A Stackelberg Game-Theoretic Defense Mechanism for Intranet Threats
Submitted by aekwall on Mon, 12/20/2021 - 12:22pm
game theory
simulation
resource management
Resiliency
pubcrawl
Organizations
Metrics
Human behavior
genetic algorithm
Games
game theoretic security
Deception Technology
Data Breach
Conferences
Computational modeling
advanced persistent threat
Scalability
Predictive Metrics
Human Factors
biblio
Cloud Agent-Based Encryption Mechanism (CAEM): A Security Framework Model for Improving Adoption, Implementation and Usage of Cloud Computing Technology
Submitted by grigby1 on Mon, 11/29/2021 - 1:33pm
adoption
CAEM Model
Cloud Computing
Computational modeling
Human Factors
implementation
Organizations
pubcrawl
Scalability
security
security improvement
Servers
Social Agents
Software as a service
biblio
A Two Layer Machine Learning System for Intrusion Detection Based on Random Forest and Support Vector Machine
Submitted by aekwall on Mon, 11/08/2021 - 3:23pm
Support vector machines
Organizations
Computational modeling
Intrusion Detection
Servers
pubcrawl
privacy
Industries
SVM
random forests
Random Forest
Anomaly
Feature Selection
threat vectors
Measurement
biblio
Identification and Mitigation Tool For Cross-Site Request Forgery (CSRF)
Submitted by aekwall on Mon, 11/08/2021 - 3:16pm
information security
Organizations
tools
Conferences
pubcrawl
Metrics
Resiliency
Human behavior
Forgery
Cross-Site Request Forgery (CSRF)
vulnerability identification
Vulnerability Mitigation Introduction
Web application
threat mitigation
biblio
An Anti-Collusion Fingerprinting based on CFF Code and RS Code
Submitted by aekwall on Tue, 10/12/2021 - 3:21pm
Fingerprint recognition
Reed-Solomon codes
Reed-Solomon code
leak traceability
digital fingerprinting
Data Security
concatenated coding
Collusion Attacks
CFF
Provenance
Organizations
encoding
composability
Human behavior
Resiliency
Metrics
pubcrawl
Distributed databases
Resists
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »