Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack surface
biblio
RouteChain: Towards Blockchain-Based Secure and Efficient BGP Routing
Submitted by grigby1 on Wed, 02/26/2020 - 3:36pm
hijacking routing paths
Youtube hijacking
weak trust model
Trust Routing
telecommunication network routing
social networking (online)
Scalability
pubcrawl
malicious entities
malicious AS broadcasts IP prefixes
Internet routing paths
internet
attack surface
false prefixes
Distributed databases
computer network security
composability
blockchain-based secure BGP routing system
blockchain
bihierarchical blockchain model
BGP prefix hijacking
BGP hijacking
BGP
autonomous systems
biblio
Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements
Submitted by grigby1 on Mon, 02/17/2020 - 4:04pm
risk analysis
graph theory
managed assets
Organizations
potential hacking paths
prioritizes surgical requirements
prioritizing Agile Security requirements
process control
pubcrawl
Remediation Requirements
requirements backlog
Requirements Prioritization
graph analytics
risk management
risk-reduction security requirements
Scalability
security
Security Operation Center
security requirements
security scalability
software prototyping
Standards organizations
virtual adversary attack paths
business risks
Agile Security models different types
agile style
attack graph
Attack Path
attack surface
attack surface reduction
Big Data
Big Data Analytics
business data processing
business process targets
business processes
Agile Security
cardinal assets
complex big data graph
Compositionality
Computer crime
constant prioritization
critical assets identification
cyber attack graphs
Cyber Digital Twin
cyber-attacks
data analysis
biblio
Reducing attack surface corresponding to Type 1 cross-site scripting attacks using secure development life cycle practices
Submitted by aekwall on Mon, 12/16/2019 - 1:17pm
malware
XSS
Web users
Web sites
Web server
Web response
Web request
Web based application vulnerabilities
Uniform resource locators
secure development life cycle practices
Scalability
resilience
pubcrawl
online front-ends
nonpersistent cross-site scripting attack
non-persistent
attack
malicious links
malicious functions
Libraries
legitimate Web site
Internet based application
internet
Human behavior
encoding
cross-site scripting
Cross Site Scripting
clients Web browser
client-side code injection attack
Browsers
attack surface
biblio
Automated Reduction of Attack Surface Using Call Graph Enumeration
Submitted by grigby1 on Wed, 05/01/2019 - 10:34am
attack surface
Automated reduction
call graph
composability
CVE-2013-4371
edge detection
Metrics
pubcrawl
resilience
Resiliency
Scalability
security
user-after-free
XEN
biblio
WISE: Lightweight Intelligent Swarm Attestation Scheme for IoT (The Verifier’s Perspective)
Submitted by aekwall on Wed, 02/13/2019 - 10:58am
swarm
online learning
performance evaluation
Protocols
resource-constrained embedded devices
resource-efficient smart broadcast authentication scheme
smart devices
Software
software integrity checking
malware detection
Task Analysis
Trusted Party
WISE
Resiliency
Human behavior
pubcrawl
composability
fine-grained multiclusters
computer network security
Scalability
Internet of Things
attestation
Hardware
Remote Attestation
attack surface
Cryptographic Protocols
security
heterogenous IoT networks
History
intelligent swarm attestation protocol
interactive protocol
Internet of Things (IoT)
IoT applications
lightweight intelligent swarm attestation scheme
biblio
Cyber Security of Smart Homes: Development of a Reference Architecture for Attack Surface Analysis
Submitted by grigby1 on Fri, 02/08/2019 - 3:32pm
proprietary standards
Smart homes
smart home reference architecture
Smart Home
smart devices
security of data
Security analysis
Scalability
Resiliency
resilience
reference architecture
pubcrawl
attack surface
pervasive computing
open systems
Metrics
Internet of Things
home automation system
home automation
high-level description
cyber-physical systems
cyber security
cyber risk
attack surface analysis
biblio
Reducing Attack Surface via Executable Transformation
Submitted by grigby1 on Fri, 02/08/2019 - 3:32pm
security
office of naval research
ONR
overwhelming emphasis
Productivity
programmers productivity
pubcrawl
resilience
Resiliency
Scalability
obscure use cases
security of data
Software
software engineering
software engineering history
software maintenance
software reusability
telecommunication security
total platform cyber protection
TPCP
individual approaches
Binary
binary transformation
Complexity theory
Conferences
constant demands
de-bloat software binaries
Debloat
deployment practices
executable transformation
attack surface
individual decisions
Late Stage Customization
Libraries
maximal code reuse
Metrics
minimal developer effort
modern software development
Navy
biblio
Ohm's Law in Data Centers: A Voltage Side Channel for Timing Power Attacks
Submitted by grigby1 on Fri, 02/08/2019 - 3:32pm
attack surface
data center
Metrics
power attack
pubcrawl
resilience
Resiliency
Scalability
security
Time Frequency Analysis
voltage side channel
biblio
A Security SLA-Driven Moving Target Defense Framework to Secure Cloud Applications
Submitted by grigby1 on Fri, 02/08/2019 - 3:32pm
attack surface
cloud moving target defense
Metrics
pubcrawl
resilience
Resiliency
Scalability
secure cloud applications
security reconfiguration
security SLA
biblio
Securing Your ICS Software with the AttackSurface Host Analyzer (AHA)
Submitted by grigby1 on Fri, 02/08/2019 - 3:31pm
attack surface
Metrics
pubcrawl
resilience
Resiliency
Scalability
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »