Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security policy
biblio
Systematic review of automatic translation of high-level security policy into firewall rules
Submitted by aekwall on Fri, 01/13/2023 - 3:53pm
Human Factors
performance evaluation
network security
pubcrawl
Scalability
Metrics
Resiliency
Systematics
telecommunication traffic
Workstations
Firewalls (computing)
security policy
Natural languages
Ontologies
security policies
firewall
biblio
Research on Data Security in Big Data Cloud Computing Environment
Submitted by grigby1 on Mon, 06/13/2022 - 3:36pm
Cloud Computing
pubcrawl
resilience
Resiliency
Scalability
information technology
Big Data
Data Security
maintenance engineering
Virtualization
security policy
Metrics
data integrity
big data security in the cloud
big data cloud computing
biblio
Identifying Considerable Anomalies and Conflicts in ABAC Security Policies
Submitted by grigby1 on Mon, 04/18/2022 - 10:52am
Access Control
Access control models
Anomalies
attribute based access control model
Big Data
Computational modeling
Computers
conflicts
Intrusion Detection
policy-based governance
Policy validation
pubcrawl
Reliability
security policies
security policy
social networking (online)
biblio
Consistency Decision Between IPv6 Firewall Policy and Security Policy
Submitted by grigby1 on Mon, 04/18/2022 - 10:51am
Security Policies Analysis
Filtering
Firewalls (computing)
IPv6 firewall policy
knowledge based systems
network security
policy-based governance
Prototypes
pubcrawl
Regulation
security
security policies
security policy
SMT
biblio
The Security Policies Optimization Problem for Composite Information Systems
Submitted by grigby1 on Thu, 04/29/2021 - 2:15pm
Information systems
Task Analysis
security policy
security policies
security
policy-based governance
optimization
operating systems
mandatory access control
pubcrawl
information security
discretionary access control
Access Control
Metrics
composability
resilience
Resiliency
Operating systems security
biblio
Policy-Based Network Access and Behavior Control Management
Submitted by grigby1 on Mon, 03/29/2021 - 2:25pm
Protocols
Identity management
illegal outreach control
information network
integrated network access
management simplification
Network Access Control
network device
network servers
policy-based network access
process control
identity authentication
pubcrawl
resilience
Scalability
security
security management
security monitoring
security policies
security policy
Servers
behavior control model
Resiliency
composability
Predictive Metrics
abstract policy configuration
Access Control
application server
application system access control
authorisation
behavior control management
Networked Control Systems Security
behavior management control
behavior management control process
Communication networks
computer network management
data drive
Data Driven
data fusion
device connection
Human behavior
biblio
Reconnaissance Attack in SDN based Environments
Submitted by grigby1 on Tue, 02/23/2021 - 2:55pm
resilience
testing
Telecommunications
telecommunication traffic
telecommunication network topology
software-defined networking
software defined networking
security policy
SDN-based solution
SDN controller
SDN based environments
SDN architecture
Scalability
Resiliency
computer network management
reconnaissance attack
Reconnaissance
pubcrawl
OpenFlow counters
network topology
Network reconnaissance
network logic
network architecture
Mininet
global network overview
Firewalls (computing)
firewalls
distributed firewall application
biblio
Runtime and Routing Security Policy Verification for Enhanced Quality of Service of IoT Networks
Submitted by aekwall on Mon, 04/13/2020 - 10:13am
software-defined networking
Service efficiency problems
routing security policy verification
interconnected devices
security policy
security policies
IoT network
quality of service
delays
network traffic
Monitoring
telecommunication network routing
Routing
policy-based governance
pubcrawl
security
Runtime
telecommunication security
Internet of Things
telecommunication traffic
biblio
The Enhanced Graphic Pattern Authentication Scheme Via Handwriting identification
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
user authentication
pattern locks
user information privacy
two factor identification scheme
touch screen
security authentication mechanism
random digital graphics
privacy information leakage
mobile device screen
keypad lock screen Apps
handwriting identification
handwriting graphic input track recognition technologies
Handwrite
graphic pattern information
graphic pattern authentication mechanism
electronic signature
Scalability
Computer graphics
privacy protection
security policy
handwriting recognition
digital signatures
authentication
smart phones
Data protection
internet
pubcrawl
Human behavior
Resiliency
mobile computing
authorisation
biblio
A Method of Conflict Detection for Security Policy Based on B+ Tree
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
network security
trees (mathematics)
tree data structures
security policy
security
Redundancy
pubcrawl
Protocols
policy-based governance
policy conflict
Policy Based Governance
B+ tree
network management system
Libraries
Indexes
detection algorithms
conflict detection
computer network security
computer network management
Communication networks
collaboration
B+ tree-based security policy conflict detection method
1
2
3
next ›
last »