Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
proactive security
biblio
PSA: An Architecture for Proactively Securing Protocol-Oblivious SDN Networks
Submitted by grigby1 on Wed, 03/18/2020 - 10:59am
pubcrawl
unified security defense framework
telecommunication control
software-defined network (SDN)
software-defined network
software defined networking
security defense function
security defense application
security
SDN security
SDN infrastructure
Scalability
Resiliency
resilience
Bandwidth
Protocols
protocol-oblivious forwarding (POF)
proactively securing protocol-oblivious SDN networks
proactive security layer
proactive security framework PSA
proactive security
Optical fibers
data-to-control plane saturation attack
control systems
computer network security
computer architecture
business logic
Business
biblio
Capture the RAT: Proximity-Based Attacks in 5G Using the Routine Activity Theory
Submitted by grigby1 on Wed, 03/06/2019 - 3:24pm
Resiliency
OMNET++
proactive security
proximity-based attack analysis
proximity-based cybercrime
pubcrawl
RAT
reactive solutions
resilience
high-level approach
routine activity theory
security
Security analysis
security problems
security software developers
Software
telecommunication security
5G cellular networks
Hardware
Device-to-device communication
critical IoT devices
CRAT
composability
cellular radio
Cellular networks
capillary network
autonomous vehicles
Autonomic Security
Analytical models
5G security
5G mobile communication
5G environments
5G devices
biblio
Predicting Impending Exposure to Malicious Content from User Behavior
Submitted by aekwall on Wed, 01/16/2019 - 1:07pm
pubcrawl
Metrics
Resiliency
composability
exposure prediction
network security
proactive security
Windows Operating System Security
biblio
CAre: Certificate Authority Rescue Engine for Proactive Security
Submitted by grigby1 on Thu, 06/07/2018 - 2:14pm
online front-ends
Web site security
Web servers
web security
SSL Trust Models
SSL technology
Scalability
Resiliency
resilience
public key infrastructure
public key cryptography
Public key
pubcrawl
proactive security
Browsers
Metrics
internet
Human behavior
encryption
digital signatures
Data Security
Cryptography
certification
Certificate Authority Rescue Engine
certificate authority
certificate authorities
centralized system
CAre
biblio
From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty
Submitted by grigby1 on Mon, 11/20/2017 - 11:25am
Mobile handsets
ubiquitous computing
stochastic programming models
stochastic programming
security policy planning
security policies
security of data
security economics
reactionary security
pubcrawl
proactive security
policy-based governance
Policy
Access Control
mathematical optimization
Government
Governance
context-aware security policy management
Context-aware security
context-aware computing
Context modeling
Context
Computational modeling
collaboration
Adaptation models
biblio
Brief Announcement: Proactive Secret Sharing with a Dishonest Majority
Submitted by grigby1 on Tue, 05/30/2017 - 12:12pm
composability
dishonest majority
Metrics
non-robust secret sharing
proac- tive secret sharing
proactive security
pubcrawl
Resiliency
secret sharing
windows operating systems security
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 1:11pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Thu, 04/30/2015 - 1:38pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware