Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software
biblio
A model for the analysis of security policies in service function chains
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
pubcrawl
virtualisation
Virtual private networks
software tools
software defined networking
Software
SFC
service function chains
Security Policies Analysis
security policies
SDN
Ad hoc networks
program verification
policy-based governance
NFV
network function virtualization
Monitoring
formal model
Cryptography
computer network security
collaboration
Analytical models
biblio
Outsmarting Network Security with SDN Teleportation
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
network security
teleportation attacks
Teleportation
Switches
software-defined networking
software defined networking
Software
security policies
security
SDN teleportation
SDN
Scalability
Resiliency
pubcrawl
Backdoors
Malicious Switch
internet
intent-based networking
Heart
formally verifiable communication networks
design space
data plane
critical network functions
covert channels
control plane separation
computer network security
Compositionality
biblio
Sciunits: Reusable Research Objects
Submitted by grigby1 on Tue, 12/12/2017 - 1:27pm
Predictive models
tools
Software
Servers
sciunit
Resiliency
reproducibility
pubcrawl
Provenance
composability
Monitoring
Metrics
metadata
Human Factors
Human behavior
Containers
Compositionality
biblio
A Feasibility Study of Autonomically Detecting In-Process Cyber-Attacks
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
Scalability
normal application behavior
off-line models
on-line models
perturbed applications
program transformation
pubcrawl
QoS requirements
quality-of-service requirements
Resiliency
Runtime
Monitoring
security
security of data
Software
software development process
software vulnerabilities
supervised training
Trusted Computing
trusted software application
unsafe actions
web applications
features extraction
application-agnostic cyber-attack detection system
Attack vectors
attacker
autonomic alert system
autonomic cyber-attack detection system
Autonomic Security
call graph
control flow
exemplar Web-based applications
feature extraction
application execution
heterogeneous software systems
in-process cyber-attacks
Instruments
Java
learning (artificial intelligence)
learning strategies
lightweight structures
machine learning techniques
Metrics
biblio
Security threat identification using energy points
Submitted by grigby1 on Mon, 12/04/2017 - 12:58pm
pubcrawl
software engineering
software development lifecycle
Software
security threat identification
security process
security of data
security mechanisms
security breaches
SDLC
Scientific Computing Security
Resiliency
Central Processing Unit
Power demand
power aware computing
Metrics
energy points
energy consumption
energy based denial of service attacks
DoS attack
cosmic Method
Computers
Computer crime
Compositionality
biblio
Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
IoT updates
update infrastructure
Software updates
Software
Smart homes
Roads
Resiliency
pubcrawl
prototype implementation
Peer-to-peer computing
Metrics
Logic gates
accountability
IoT
Internet of Things
internet
Innocuousness
computer network security
computer architecture
Compositionality
botnets
blockchain
Availability
biblio
Modeling of countermeasure against self-evolving botnets
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
Markov chains
zombie computers
Viruses (medical)
Software
simulation experiments
self-evolving botnets
Resiliency
Radiation detectors
pubcrawl
Metrics
Markov processes
botnets
malicious attackers
machine learning
learning (artificial intelligence)
invasive software
digital simulation
computing resources
Computers
Computational modeling
Compositionality
biblio
SVED: Scanning, Vulnerabilities, Exploits and Detection
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Metrics
vulnerability detection
vulnerabilities
threat intelligence information
SVED
Software
Sensor Systems
security of data
scanning
Resiliency
pubcrawl
Compositionality
malicious actions
Intrusion Detection Systems
Intelligent sensors
Human Factors
Human behavior
exploits and detection tool
distributed architecture
Databases
cyber security experiments
computer security
biblio
PowerCyber: A remotely accessible testbed for Cyber Physical security of the Smart Grid
Submitted by grigby1 on Mon, 11/27/2017 - 12:25pm
power grid vulnerability analysis
vulnerability assessment
user interfaces
Software
smart power grids
Smart Grid
security
Resiliency
remote accessible testbed
pubcrawl
product testing
PowerCyber CPS security testbed
power systems
power system security
attack-defense platform
power engineering computing
Phasor measurement units
Metrics
Load modeling
ISU
Iowa State University
impact analysis
experimental orchestration framework
cyber-physical systems
Cyber Physical System
computer architecture
composability
biblio
Cyber security threats \#x2014; Smart grid infrastructure
Submitted by grigby1 on Mon, 11/27/2017 - 12:25pm
security of data
prosumer
Protocols
pubcrawl
R and D
Resiliency
risk evaluation process
SCADA
secure cyber infrastructure
power system security
smart devices
smart grid infrastructure
Smart Grids
smart meters
smart power grids
smart power system
Software
WANs
ICT
computer security
cyber infrastructure
cyber security
cyber security threats
cyber-attack
Demand response (DR)
denial-of-service (DoS)
electronic devices
composability
ICT driven power equipment massively layered structure
Metrics
new generation sensors
NIST
Peak Load Management (PLM)
power grid vulnerability analysis
power system framework
« first
‹ previous
…
68
69
70
71
72
73
74
75
76
…
next ›
last »