Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
firewalls
biblio
Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall
Submitted by aekwall on Mon, 10/19/2020 - 11:07am
compromised machine
KP-ABE
Key Policy Attribute Based Encryption (KP-ABE)
Stephen-Davidowitz
nontrivial combining nonmonotonic formula
nonmonotonic access structure
non-monotonic access structure
multiauthority nonmonotonic KP-ABE scheme
multiauthority key-policy ABE scheme
multiauthority ABE scheme
Multi-authority
MA-KP-ABE-CRF system
ex-filtration
cryptographic reverse firewall concept
cryptographic reverse firewall
CRF security protection
firewalls
Charm library
attribute-based encryption field
attribute-based encryption
formal security analysis
Resists
Firewalls (computing)
pubcrawl
Resiliency
Protocols
secret keys
Access Control
encryption
Cryptography
Scalability
biblio
A Dynamic Security Control Architecture for Industrial Cyber-Physical System
Submitted by grigby1 on Fri, 10/16/2020 - 10:31am
pubcrawl
Industrial Control Systems
industrial cyber-physical system
information security
information security requirements
internal fire control wall
intrusion detection system
linkage verification
Protocols
industrial control system
resilience
Scalability
secure industrial control information security system
Servers
Trusted Computing
trusted connection server
Trusted Platform Module
dynamic security control architecture
Resiliency
cyber-physical system security
trusted platform modules
Anomaly Detection
control system security
control systems
Cryptography
data fusion
composability
dynamic security control strategy
Dynamic strategy
firewalls
Firewalls (computing)
hardware encryption
ICs
industrial control
biblio
Implementation of Blockchain Based Distributed Web Attack Detection Application
Submitted by grigby1 on Fri, 09/18/2020 - 1:07pm
firewalls
command injection attacks
Co
web-based attacks
Web servers
Web platforms
web attack detection application
Web attack detection
web application firewalls
Stakeholders
signature based detection method
signature based detection
Cryptography
blockchain based web attack detection model
Reliability
Metrics
smart contracts
composability
internet
Resiliency
resilience
pubcrawl
Distributed databases
blockchain
biblio
A Secured OpenFlow-Based Software Defined Networking Using Dynamic Bayesian Network
Submitted by aekwall on Mon, 08/24/2020 - 12:36pm
Ryu controller
Transport Layer Security
stateful firewall
state information
secured OpenFlow-based software defined networking
programmable network protocol
main standard protocol
emulated network
dynamic bayesian network
distributed denial-of-service attack
denial-of-service attack
belief networks
Hidden Markov models
computer network security
Firewalls (computing)
Heuristic algorithms
OpenFlow
composability
pubcrawl
Resiliency
transport protocols
software defined networking
Bayes methods
Protocols
firewalls
biblio
Intrusion Detection System Model Implementation against DDOS attacks
Submitted by aekwall on Mon, 06/29/2020 - 11:46am
prevention systems
DDoS attack detection
SNORT bandwidth traffic analysis
Snort
intrusion detection system model implementation
intrusion detection methods
intrusion actions
firewall policy
DDoS Attacks
computer installation
DDoS
Metrics
composability
pubcrawl
Human behavior
Resiliency
telecommunication traffic
firewalls
IDS
biblio
Hardware-Assisted Security in Electronic Control Units: Secure Automotive Communications by Utilizing One-Time-Programmable Network on Chip and Firewalls
Submitted by grigby1 on Fri, 05/15/2020 - 11:30am
secure execution environments
Firewalls (computing)
Hardware
hardware firewalling
hardware-assisted security
network-on-chip
off-chip networking techniques
on-chip network physical isolation
one-time-programmable network
Secure Automotive Communications
firewalls
smart automotive technologies
software-dominated enhancements
system-level countermeasures
system-on-chip
system-wide cryptographic techniques
threat models
Trusted Electronic Control Units
vehicle-to-vehicle communications
automotive controller area network-bus communications
network on chip security
Scalability
Resiliency
resilience
Metrics
advanced driver assistance systems
authentication
automotive communications
pubcrawl
automotive electronics
Automotive engineering
controller area networks
cyber-enabled automotive system
data privacy
driver information systems
electronic control units
enjoyable driving
biblio
Malware Detection Using Honeypot and Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 3:42pm
malware
Trojan Horse malware
threat vectors
SVM
Support vector machines
support vector machine
signature-based security systems
Scalability
Resiliency
pubcrawl
privacy
Metrics
Measurement
malware detection
Adware malware
machine learning
learning (artificial intelligence)
invasive software
Human Factors
honey pots
honeypot
firewalls
digital signatures
Decision trees
Decision Tree
computer viruses
computer malware
biblio
Development of the Algorithm for Protection against DDoS-Attacks of Type Pulse Wave
Submitted by grigby1 on Wed, 12/18/2019 - 1:46pm
internet
traffic classifier
telecommunication traffic
Servers
Resiliency
resilience
pulse wave type DDoS-attack prevention
pubcrawl
network technologies
Network
Metrics
IP networks
botnet
Human behavior
firewalls
firewall
dpi
DDoS Attack Prevention
DDoS attack detection
DDoS
Computer crime
composability
Communication networks
biblio
Quantifying the Security Effectiveness of Firewalls and DMZs
Submitted by aekwall on Wed, 05/01/2019 - 12:04pm
pubcrawl
collaboration
comparability
composability
Cybersecurity dynamics
demilitarized zones
Dynamical Systems
firewalls
Human behavior
Metrics
preventive dynamics
Resiliency
Scalability
Science of Security
Security Metrics
security quantification
biblio
Fuzzy Logic Aided Intelligent Threat Detection in Cisco Adaptive Security Appliance 5500 Series Firewalls
Submitted by grigby1 on Wed, 05/01/2019 - 10:29am
statistical information
organisational security
prioritised security events
pubcrawl
resilience
Resiliency
security
security status
significant information
software version
organisational networks
third-party tool
threat detection function
threat detection process
threat detection statistics
tools
traffic patterns
user interfaces
valuable features
Firewalls (computing)
analysing packet drop statistics
Cisco adaptive security appliance 5500 series firewall
complete basic threat detection
comprehensible solution
Computer crime
customised feature based threat detection
feature extraction
firewalls
advanced threat detection
Fuzzy logic
fuzzy reasoning
fuzzy reasoning system
intelligent threat detection solution
Metrics
Monitoring
network traffic
organisational aspects
« first
‹ previous
1
2
3
4
5
next ›
last »