Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
adaptive security
biblio
Adaptive Security Risk Mitigation in Edge Computing: Randomized Defense Meets Prospect Theory
Submitted by grigby1 on Tue, 05/10/2022 - 12:53pm
prospect theory
wireless sensor networks
ubiquitous computing
Stochastic game
Scalability
risk mitigation
Resiliency
resilience
quality of service
pubcrawl
Stochastic Computing Security
privacy
performance evaluation
Metrics
Human Factors
Games
edge computing
Dynamic scheduling
data centers
adaptive security
biblio
Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing
Submitted by grigby1 on Fri, 09/04/2020 - 4:16pm
resilience
modified decryption outsourcing mode
OD-ABE scheme
outsourced decryption
outsourcing
private key cryptography
pubcrawl
public key cryptography
public transformation key
Metrics
Resiliency
security model
selective security model
shorter bit length
standards
underlying ABE scheme
underlying standard ABE
ABE ciphertext
generic construction
generic approach
faster decryption time
encryption
efficient transformation key generation algorithm
concrete constructions
composability
Cloud Computing
black-box way
black box encryption
authorisation
attribute-based encryption
adaptive security
Adaptation models
ABE outsourcing schemes
biblio
Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks
Submitted by aekwall on Mon, 01/20/2020 - 12:05pm
mediation
Zero-day attacks
zero-day attack
Zero Day Attacks and Defense
testing
Survivability
security
Resiliency
Red Team exercise
record & replay
pubcrawl
Predictive Metrics
novel attacks
network-facing application
network service
Monitoring
Zero day attacks
IP networks
Fires
File systems
execution management environment
empirical evaluation
CTF tournament
critical system
computer network security
composability
capture the flag tournament
app store
adaptive security
A3 environment
A3 defensive technology
defense
file
Yuan_Systematic_Survey.pdf
Submitted by Jamie Presken on Mon, 12/05/2016 - 12:43pm
adaptive security
Algorithms
Autonomic computing
CMU
design
July'14
Reliability
security
self-* properties
self-adaptive systems
Self-protection
biblio
A Systematic Survey of Self-Protecting Software Systems
Submitted by Jamie Presken on Mon, 12/05/2016 - 12:43pm
adaptive security
Algorithms
Autonomic computing
CMU
design
July'14
Reliability
security
self-* properties
self-adaptive systems
Self-protection
CMU
July'14
profile
xavier bellekens
Architectures
Concurrency and Timing
Defense
Energy
Critical Infrastructure
Health Care
Science of System Integration
Science of Security
Validation and Verification
CPS Technologies
Education
Research Program Overview
nuclear safety
best practices
adaptive security
Adoption of Cybersecurity Technology
Awareness
cyber situational awareness
pricacy
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 2:11pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Thu, 04/30/2015 - 2:38pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware