Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack surface
biblio
Taking Control of SDN-Based Cloud Systems via the Data Plane
Submitted by grigby1 on Fri, 02/08/2019 - 3:31pm
openstack
Virtual Switches
SDN security
SDN
Scalability
rop attacks
ROP
Resiliency
resilience
pubcrawl
Packet Parsing
attack surface
Open vSwitch
NFV
network virtualization
Network Isolation
MPLS
Metrics
data plane security
Cloud Security
Attacker Models
biblio
Block Oriented Programming: Automating Data-Only Attacks
Submitted by grigby1 on Fri, 02/08/2019 - 3:31pm
attack surface
Binary Analysis
block oriented programming
data only attacks
exploitation
Metrics
Program Synthesis
pubcrawl
resilience
Resiliency
Scalability
Security Heuristics
biblio
Policy Injection: A Cloud Dataplane DoS Attack
Submitted by grigby1 on Fri, 02/08/2019 - 3:31pm
attack surface
Cloud Security
DoS
Metrics
OVS
policy injection
pubcrawl
resilience
Resiliency
Scalability
biblio
A System Attack Surface Based MTD Effectiveness and Cost Quantification Framework
Submitted by grigby1 on Fri, 02/08/2019 - 3:31pm
attack surface
Chained Attacks
Metrics
moving target defense
Predictive Metrics
pubcrawl
Quantification Framework
resilience
Resiliency
Scalability
System Attack Surface
biblio
BinRec: Attack Surface Reduction Through Dynamic Binary Recovery
Submitted by grigby1 on Fri, 02/08/2019 - 3:31pm
attack surface
attack surface reduction
binary lifting
LLVM
Metrics
pubcrawl
resilience
Resiliency
Scalability
Symbolic Execution
biblio
Detection of transformed malwares using permission flow graphs
Submitted by grigby1 on Wed, 06/20/2018 - 11:49am
privacy
malware variants
Measurement
Metrics
mobile computing
nontransformed malware
permission flow graph
permission flow graphs
permission framework
Malware Analysis
pubcrawl
resilience
Resiliency
signature based detection
smart phones
state-of-the-art graph similarity algorithm
transformed malware
vertex level
graph based similarity metrics
Android malware
Androids
attack surface
code level changes
control flow
detection accuracy
feature extraction
flow graphs
Android app
graph theory
Human behavior
Humanoid robots
invasive software
learning (artificial intelligence)
lightweight static Permission Flow Graph based approach
malicious apps
malware
biblio
Designing agility and resilience into embedded systems
Submitted by K_Hooper on Fri, 02/02/2018 - 10:06am
computer security
high level system properties
Global Positioning System
embedded systems
design for cyber security
cyber-physical systems
cyber security
cyber resilience
CPS
Measurement
best-practice security policies
autonomous aerial vehicles
attacker
attack surface
Assessment
ARES methodology
analytic process guides system developers
adversarial actors
resilience
UAS
Systems architecture
systems analysis
system analysis and design
security of data
RF environment
Resilient Security Architectures
Resiliency
unmanned aerial systems
remotely located communicating devices
pubcrawl
mission success
mission objectives
mission assurance a challenging problem
Mission Assurance
Metrics
metric set
biblio
Scalability of Cloud Based SCIT-MTD
Submitted by grigby1 on Thu, 12/28/2017 - 12:28pm
moving target defense
Web application
Virtual machining
share-nothing architecture pattern
Servers
self cleansing intrusion tolerance
security of data
security
SCIT
Scalability
Resiliency
quality attributes
pubcrawl
multiple instance system
multinode system
attack surface
malicious intrusions
load demand modeling
intrusion tolerance
internet
Data protection
cybersecurity protection
continuous rotation
computer architecture
composability
cloud infrastructure services
Cloud Computing
cloud based SCIT-MTD scalability
cloud
biblio
An Automated Approach for Testing the Security of Web Applications Against Chained Attacks
Submitted by K_Hooper on Wed, 11/01/2017 - 10:03am
Chained Attacks
attack surface
Metrics
model-based testing
pubcrawl
resilience
Scalability
security
web applications
biblio
Understanding and Defending the Binder Attack Surface in Android
Submitted by K_Hooper on Wed, 11/01/2017 - 10:03am
Scalability
resilience
pubcrawl
Metrics
attack surface
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »