Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trees (mathematics)
biblio
Evaluating the Effectiveness of Security Metrics for Dynamic Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
graphical security models
Workstations
trees (mathematics)
temporal hierarchical attack representation model
shortest attack path
Servers
security assessment
security
Resiliency
resilience
network system security posture
modern enterprise network security
Metrics
Measurement
Security Metrics
dynamic networks
Databases
cyber security
configuration changes
computer network security
comprehensive analysis
composability
attack trees
attack graphs
attack cost
Analytical models
Adaptation models
pubcrawl
biblio
The undetectable clock cycle sensitive hardware trojan
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
Hardware
Trusted design
Trojan horses
trees (mathematics)
Resiliency
resilience
redundant circuits
pubcrawl
Microelectronic Security
Metrics
invasive software
HT
Hardware Trojans
Circuit faults
FSM
finite state machines
finite state machine
embedded systems
embedded clock-cycle-sensitive hardware trojans
delays
Cryptography chips
Cryptography
critical path
composability
Clocks
clock tree structure
biblio
Detecting DOM-Sourced Cross-Site Scripting in Browser Extensions
Submitted by grigby1 on Thu, 02/15/2018 - 11:44am
shadow DOM
JavaScript engines
metadata
online front-ends
program diagnostics
program testing
pubcrawl
resilience
Resiliency
Scalability
security of data
JavaScript
static analysis
text analysis
text filter
trees (mathematics)
Uniform resource locators
web applications
Web pages
web security
XSS vulnerabilities
DOM-sourced XSS
application program interfaces
browser extension vulnerability
browser extensions
Browsers
client-side vulnerabilities
computational linguistics
Cross Site Scripting
Cross Site Scripting (XSS)
Document Object Model
DOM-sourced cross-site scripting detection
abstract syntax tree parser
dynamic symbolic execution
HTML documents
HTML5 API
Human behavior
human factor
Human Factors
hypermedia markup languages
internet
Java
biblio
Studying cyber security threats to web platforms using attack tree diagrams
Submitted by K_Hooper on Wed, 02/14/2018 - 11:59am
information technology
WordPress vulnerabilities
WordPress platform
Web platforms
Web platform
trees (mathematics)
security threats
security personnel
security of data
Scalability
Resiliency
pubcrawl
Organizations
Open Source Software
Metrics
internet
artificial intelligence security
information systems designers
Information systems
Human behavior
graphical analysis
global reference system
cyber-attack
cyber security threats
Computers
computer system
computer security threats
computer security
common vulnerabilities
Attack Tree method
attack tree diagrams
attack tree
biblio
Providing advanced security mechanism for scalable data sharing in cloud storage
Submitted by grigby1 on Fri, 11/03/2017 - 11:30am
public key cryptography
trees (mathematics)
tree structure
standards
smart cards
Smart card
single key file encryption
Servers
security of data
secret key aggregation
Scalable Security
scalable data sharing
Scalability
public-key cryptosystems
advanced security mechanism
public key crypto system
pubcrawl
KAC
encryption
decryption right allocation
data handling
cloud storage
Cloud Computing
Ciphers
cipher texts
cipher text
Aggregates
biblio
Modeling Fraud Prevention of Online Services Using Incident Response Trees and Value at Risk
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
internet
Trojan horses
trees (mathematics)
risk analysis
pubcrawl170109
probability estimation
probability
online financial service
Online banking
IRT
Computer crime
incident response tree
fraud prevention modelling
fraud
financial data processing
Europe
estimation theory
cyber criminal
conditional fraud value
biblio
Using Dynamic Taint Approach for Malware Threat
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
pubcrawl170109
Information Flow
intersuspicious modules
invasive software
malware
Malware behavioural analysis
malware infection
malware threat analysis
network threats
FSM
Servers
suspicious apps
taint checking tools
taint marking
threat analysis
trees (mathematics)
weighted spanning tree analysis scheme
Computer hacking
Android programs
attack sequence
behavioural analysis
cloud applications
Cloud Computing
cloud computing server
Computational modeling
Computer crime
Analytical models
cyber security attack
data tracking
defence capability
Dynamic taint propagation
dynamic taint propagation analysis model
finite state machine
finite state machines
biblio
Many-to-all priority-based network-coding broadcast in wireless multihop networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
priority-based deadlock prevention
wireless networks
wireless multihop networks
Wireless communication
Vectors
trees (mathematics)
Topology
telecommunication network topology
System recovery
radio networks
Protocols
broadcast
packet transmission
network coding
minimum transmission broadcast problem
maximum out-degree problem
many-to-all- with-network-coding MTB problem
Energy Efficiency
encoding
distributed many-to-all priority-based network-coding broadcast protocol
broadcast trees
biblio
An Accumulated Loss Recovery Algorithm on Overlay Multicast System Using Fountain Codes
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
accumulate loss recovery algorithm
Decoding
delay reduction
delays
encoding
error correction codes
Fountain codes
multicast communication
overlay multicast system
overlay multicast tree
overlay networks
Packet loss
packet loss decoding
packet radio networks
simulation
trees (mathematics)
biblio
Genetic Hash Algorithm
Submitted by BrandonB on Wed, 05/06/2015 - 11:47am
genetic hash algorithm
Watermarking
visualization
trees (mathematics)
security
search optimization technique
image watermarking
hash visualization
Hash functions
Genetics
authentication
genetic algorithms
Fitness value
Data visualization
data hiding
data encapsulation
Cryptography
complex random generated images
Chromosome
Biological cells
« first
‹ previous
1
2
3
4
5
6
next ›
last »