Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Information systems
biblio
Operational data classes for establishing situational awareness in cyberspace
Submitted by BrandonB on Tue, 05/05/2015 - 12:30pm
networking technologies
US Department of Defense
United States
tactical decision-making
strategic decision-making
security of data
real-time systems
operational needs
operational decision-making
operational data classes
operational cyber environment
Cyber Attacks
military computing
Intrusion Detection
Information systems
Educational institutions
Department of Defense
defence industry
Decision Making
cyberspace operations
Cyberspace
cyber situational awareness
biblio
Soft systems methodology in net-centric cyber defence system development
Submitted by BrandonB on Tue, 05/05/2015 - 12:09pm
modeling
system dynamics model
System Dynamics
system behaviour
SSM
soft systems methodology
sociotechnical systems
situational awareness
security of data
SA
net-centric information system
net-centric hypothesis
net-centric cyber defence system development
net-centric approach
Net-Centric
collaboration
interdependent dynamic relationships
information value
Information systems
information sharing community
information security
information reach
information environment
human activity system
Distributed Information Systems
data sources
complexity
Communities
command and control
collaborative communities
biblio
Malicious data classification using structural information and behavioral specifications in executables
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
Software
malwares
NtTrace
obfuscation technology
pattern classification
program diagnostics
security devices
signature database
signature-based detection system
malware detection system efficiency improvement
static analysis
structural information
Syntactics
system calls
threat detection
threat mitigation
underground Internet economy
zero-day malware detection
internet
antivirus
automated malicious programs
behavioral specifications
Classification algorithms
dynamic analysis
executable file
feature extraction
Information systems
Algorithm design and analysis
invasive software
malicious behavior extraction
malicious data classification
malicious software detection
malicious software mitigation
malware
malware detection
malware detection system effectiveness improvement
biblio
Quantifying cyber-resilience against resource-exhaustion attacks
Submitted by BrandonB on Tue, 05/05/2015 - 11:44am
Queueing analysis
stress-strain curve
Stress
Strain
simple queuing system
Servers
security of data
resource-exhaustion attacks
resilience
queuing theory
queueing theory
cyber security
networked queuing systems
Mechanical Engineering
material science
linguistic terms
Information systems
information sciences
information science
engineering terms
cyber-resilience quantification
cyber systems
biblio
Morphing communications of Cyber-Physical Systems towards moving-target defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:18am
morphing communications
traffic analysis attacks
Time factors
thwarting traffic analysis attacks
telecommunication traffic
Silicon
security
reliable communication services
real-time systems
networking infrastructures
network sessions
moving-target defense
Algorithm design and analysis
long-range communication services
internet
inter-packet delays
Information systems
eavesdrop network traffic
delays
cyber-physical systems
CPSMorph traffic morphing algorithm
CPS traffic
computer network reliability
biblio
A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces
Submitted by BrandonB on Tue, 05/05/2015 - 11:13am
moving-target defense
VM migration-snapshotting
uncertainty
simulation
service attack surface
security of data
security
S-shaped generalized logistic function
risk modeling
replacement pool
Probes
probability
probabilistic MTD service deployment
Probabilistic logic
probabilistic algorithm
moving-target defense strategy
attack-surface heterogeneity-and-dynamics awareness
Mathematical model
Information systems
homogeneity problem
heterogeneous attack surfaces
Equations
dynamic probability
dynamic attack surfaces
diversity-compatibility
deep automation
configuration staticity
cloud-specific features
cloud-based service security
cloud infrastructures
Cloud Computing
attacker intelligence
biblio
Analysis of network address shuffling as a moving target defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:13am
Computational modeling
Computers
Information systems
IP networks
moving target defense
network address remapping
network address shuffling
probabilistic models
probability
Probes
Reconnaissance
security of data
« first
‹ previous
…
3
4
5
6
7
8
9
10
11