Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security threat
biblio
Quantitative Risk Assessment of Threats on SCADA Systems Using Attack Countermeasure Tree
Submitted by grigby1 on Fri, 02/17/2023 - 5:13pm
critical infrastructure
security
pubcrawl
resilience
Resiliency
SCADA systems
cyber-physical systems
Compositionality
SCADA
power systems
security threat
security management
SCADA Systems Security
threat assessment
attack countermeasure tree
quantitative assessment
biblio
Internet of Things based Data Security Management using Three Level Cyber Security Policies
Submitted by aekwall on Fri, 01/13/2023 - 3:53pm
Human Factors
IoT
Internet of Things
Data Security
pubcrawl
Scalability
Metrics
Resiliency
cyberattack
Informatics
cyber security
cyber attack
security policies
security threat
biblio
A Survey on Security and Privacy Threats to Federated Learning
Submitted by grigby1 on Mon, 04/18/2022 - 2:36pm
policy-based governance
security weaknesses
security threat
Resists
Resiliency
resilience
pubcrawl
Protocols
Privacy-preserving
privacy
Collaborative Work
poisoning attacks
inference attacks
IEEE standards
Human behavior
generative adversarial networks
GAN attacks.
federated learning
Computational modeling
biblio
A Framework for Collecting and Analysis PE Malware Using Modern Honey Network (MHN)
Submitted by grigby1 on Thu, 03/04/2021 - 2:44pm
PE malware
malware PE file type formats
malware samples
Metrics
modern honey network
operating systems
operating systems (computers)
Payloads
PE file format
malware information
resilience
security
security threat
static analysis techniques
Windows operating system
Windows Operating System Security
windows-based malware
static analysis
malware detection
malware collection technique
Malware Analysis
malware
learning (artificial intelligence)
invasive software
file format information
feature extraction
dynamic analysis techniques
Computers
computer viruses
Resiliency
composability
Human behavior
pubcrawl
biblio
Black-box Adversarial Machine Learning Attack on Network Traffic Classification
Submitted by grigby1 on Fri, 09/04/2020 - 4:10pm
machine learning
Training
telecommunication traffic
telecommunication computing
Support vector machines
security threat
security
Resiliency
resilience
pubcrawl
Perturbation methods
pattern classification
Neural networks
Network traffic classification
Metrics
Adversarial Machine Learning
learning (artificial intelligence)
deep machine learning-based classifiers
deep machine learning techniques
deep machine learning models
Data models
computer network security
composability
black-box adversarial machine
black-box adversarial attack
Black Box Security
autonomous networks
adversarial threats
adversarial perturbations
biblio
Design and Realization of a Computer Security Control Circuit for Local Area Network
Submitted by aekwall on Mon, 05/04/2020 - 11:22am
control unit
Networked Control Systems Security
security threat
secure hard disk
ordinary hard disk
new technology challenge
network attack
management defect
local area network computer security control circuit
LAN security
LAN computers
LAN computer security control circuit
Hard disks
cyberattack
Circuit synthesis
circuit design
Predictive Metrics
security management
Local area networks
Information systems
composability
pubcrawl
Resiliency
information security
computer network security
biblio
A Co-Occurrence Recommendation Model of Software Security Requirement
Submitted by aekwall on Mon, 03/23/2020 - 1:30pm
software products
software SRs
software security threat
semantic similarity
security-critical software systems
security threat
security target documents
security requirements
nonsecurity specialists
natural language processing
CoRM model
co-occurrence recommendation model
Co-occurrence Recommend Model (CoRM)
security of data
recommender systems
Semantics
Human Factors
Unified modeling language
software engineering
Training
pubcrawl
Resiliency
Software
security
Scalability
biblio
SVMDF: A Secure Virtual Machine Deployment Framework to Mitigate Co-Resident Threat in Cloud
Submitted by grigby1 on Mon, 03/09/2020 - 1:26pm
Cloud Security
load balance
CRRVA
covert channel attacks
co-resident-resistant VM allocation
co-resident threat mitigation
co-resident threat defense solution
co-resident attacks
CloudSim
migration cost
Cloud Computing
attack-aware VM reallocation
analytic hierarchy process-based threat score mechanism
analytic hierarchy process
allocation co-resident threat
AHPTSM
AAVR
security threat
VM pairs
VM migration
VM allocation policy
virtual machines
virtual machine security
threat score distribution
SVMDF
side channel attacks
VM threat score mechanism
security of data
secure virtual machine deployment framework
runtime co-resident security
resource interference attacks
resource allocation
pubcrawl
power consumption
biblio
Establishing Independent Audit Mechanisms for Database Management Systems
Submitted by grigby1 on Mon, 07/01/2019 - 10:02am
Scalability
logging
malicious hacking
meta data
metadata
Organizations
pubcrawl
Random access memory
resilience
Resiliency
independent audit mechanisms
security
security audit
security audit tools
Security Audits
security breaches
security threat
storage image
tamper-detection software
tools
Digital Forensics
auditing
comprehensive audit framework
Computer crime
computer crimes
database forensic analysis
database forensics
database forensics methods
database management systems
Databases
apriori database preparation
evidence gathering
file system metadata
forensic audit tools
Forensics
Human behavior
Human Factors
Image reconstruction
independent audit framework
biblio
Security Analysis of Vehicular Ad-hoc Networks based on Attack Tree
Submitted by grigby1 on Mon, 01/21/2019 - 12:31pm
tree structure
private information
pubcrawl
Resiliency
security
Security analysis
security threat
smart cities
telecommunication security
privacy
trees (mathematics)
VANET
vehicle network
vehicles
vehicular ad hoc network
vehicular ad hoc networks
vehicular ad-hoc networks
Ad Hoc Network Security
open access environment
Metrics
Logic gates
integrity
information discreet
important security requirements
data privacy
confidentiality
confidential information
Conferences
Computers
Compositionality
Availability
attack-defense tree
attack tree
1
2
next ›
last »