Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software
biblio
BigCrypt for Big Data Encryption
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
Pretty Good Privacy technique
zero tolerance security
symmetric key encryption
storage management
Software
Servers
RSA
Rijndael
Resiliency
resilience
Receivers
Public key
pubcrawl
probability
probabilistic approach
private information
Asymmetric Encryption
Metrics
Human behavior
Hadoop
Hacking
encryption
Data protection
Cryptography
Compositionality
cloud storage
Cloud Computing
BigCrypt
big data encryption
Big Data
asymmetric encryption technique
biblio
Cluster-Based Vulnerability Assessment Applied to Operating Systems
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
Predictive models
Windows operating system
Windows
vulnerability records
vulnerability assessment
Stochastic processes
software reliability models
software reliability
Software
security
Resiliency
resilience
pubcrawl
clustering
OSs
operating systems
nonhomogeneous Poisson process
monotonic intensity function assumption
Metrics
mean value function
Linux
Databases
Curve fitting
Correlation
composability
biblio
Models of Reliability of Fault-Tolerant Software Under Cyber-Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
Software
on-demand software
Probabilistic logic
probabilistic model
pubcrawl
resilience
Resiliency
Scalability
security of data
noncompromised software
software fault tolerance
software fault-tolerance
software maintenance
software maintenance policies
software reliability
sophisticated synchronized attacks
synchronized attacks system reliability
telecommunication security
fault tolerant architecture
adversary
Adversary Models
computer security
cyber-attacks
cyber-security controls
diverse software
failure regions
fault tolerance
adequate adversary model
Fault tolerant systems
fault-tolerant software
Human behavior
independent attacks
industrial control applications
industrial protection systems
Metrics
biblio
Accurate Detection of Automatically Spun Content via Stylometric Analysis
Submitted by grigby1 on Mon, 03/19/2018 - 1:37pm
spam
unsolicited e-mail
text spinning software
text spinning
text spinner dictionary
text analysis
stylometry
stylometric artifacts
stylometric analysis
spun documents
spun content detection
Spinning
spammers
content spinning techniques
Software
search engines
pubcrawl
plagiarism detector evasion
plagiarism detection
Plagiarism
Metrics
Human behavior
Frequency measurement
feature extraction
Dictionaries
biblio
Compromising Security of Economic Dispatch in Power System Operations
Submitted by grigby1 on Mon, 03/05/2018 - 1:13pm
power generation dispatch
true line capacity ratings
Software
Smart Grids
sensors
semantics-based attack generation
security
Resiliency
resilience
pubcrawl
power system operations
Power system dynamics
power grids
power grid operations
power generation economics
bilevel optimization problem
network security seem like the most relevant keywords
mixed integer linear program
Metrics
Linear programming
integer programming
false data injection attacks
energy management systems
energy management
Economics
Economic dispatch
dynamic networks
cyber-physical systems
composability
biblio
Compromising Security of Economic Dispatch in Power System Operations
Submitted by grigby1 on Mon, 03/05/2018 - 1:13pm
power generation dispatch
true line capacity ratings
Software
Smart Grids
sensors
semantics-based attack generation
security
Resiliency
resilience
pubcrawl
power system operations
Power system dynamics
power grids
power grid operations
power generation economics
bilevel optimization problem
network security seem like the most relevant keywords
mixed integer linear program
Metrics
Linear programming
integer programming
false data injection attacks
energy management systems
energy management
Economics
Economic dispatch
dynamic networks
cyber-physical systems
composability
biblio
Compromising Security of Economic Dispatch in Power System Operations
Submitted by grigby1 on Mon, 03/05/2018 - 1:12pm
power generation dispatch
true line capacity ratings
Software
Smart Grids
sensors
semantics-based attack generation
security
Resiliency
resilience
pubcrawl
power system operations
Power system dynamics
power grids
power grid operations
power generation economics
bilevel optimization problem
network security seem like the most relevant keywords
mixed integer linear program
Metrics
Linear programming
integer programming
false data injection attacks
energy management systems
energy management
Economics
Economic dispatch
dynamic networks
cyber-physical systems
composability
biblio
Assessing the Quality of Tabular State Machines through Metrics
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
quality of models
Variable speed drives
Unified modeling language
tabular state machines
software quality
software metrics
Software measurement
Software
security
Resiliency
resilience
Adaptation models
pubcrawl
Model metrics
Metrics
Cryptography
Compositionality
Complexity theory
coding theory
ASD models
analytical software design tooling
biblio
Correlation Analysis among Java Nano-Patterns and Software Vulnerabilities
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
pubcrawl
testing
static analysis
Software patterns
Software
security vulnerabilities
security
Resiliency
resilience
arrays
nano-patterns
Metrics
Measurement
Java
Cryptography
Compositionality
Complexity theory
coding theory
biblio
Evaluation of a Formalized Encryption Library for Safety-Critical Embedded Systems
Submitted by grigby1 on Tue, 02/27/2018 - 2:28pm
safety leveraged implementation of data encryptio
optimisation
optimization
programming languages
pubcrawl
public key cryptography
public-key based encryption
resilience
Resiliency
resource restricted embedded safety devices
Safety
model based language
safety leveraged implementation of data encryption
safety-critical embedded systems
safety-critical infrastructure
safety-critical software
Scade
security architecture multiple independent levels
SLIDE library
Software
synchronous dataflow language optimization
train control safety application
embedded systems
authentication
complex safety-critical devices
composability
confidentiality
Cryptographic Protocols
cryptography implementations
data integrity
demilitarized zones
dependable communication
diverse integration patterns
Air gaps
encrypting gateways
encryption
formalized encryption library evaluation
Human behavior
Human Factors
infamous air gap
integrity
Libraries
Metrics
« first
‹ previous
…
63
64
65
66
67
68
69
70
71
…
next ›
last »