Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Containers
biblio
The Anomaly Detection Mechanism Using Extreme Learning Machine for Service Function Chaining
Submitted by grigby1 on Tue, 03/30/2021 - 11:54am
ICS Anomaly Detection
service integrity
service function chaining
Scalability
Resiliency
resilience
pubcrawl
Neurons
network function virtualization
5G mobile communication
Extreme learning machines
extreme learning machine
Containers
cloud-native
Cloud Computing
Anomaly Detection
5g network
biblio
Comprehensive Java Metadata Tracking for Attack Detection and Repair
Submitted by grigby1 on Mon, 03/15/2021 - 1:09pm
Java
software safety
Resiliency
resilience
pubcrawl
Metrics
metadata
maintenance engineering
Libraries
arrays
Intrusion Detection
Instruments
Containers
computer security
Computer errors
composability
command injection attacks
biblio
A Human Immunity Inspired Intrusion Detection System to Search for Infections in an Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 2:43pm
human immunity inspired intrusion detection system
Windows Operating System Security
Windows operating system
security of data
security
receptors
operating systems (computers)
operating system
negative selection algorithm
microsoft windows
intrusion detection system
Intrusion Detection
Immune system
Operating systems security
Containers
computer software
computer security
composability
artificial immune system
Anomaly Detection
pubcrawl
Metrics
composabilty
resilience
Resiliency
biblio
Lightweight Testbed for Cybersecurity Experiments in SCADA-based Systems
Submitted by grigby1 on Tue, 02/23/2021 - 2:58pm
reconnaissance attack
Network reconnaissance
network scanning
network traffic
Open area test sites
pattern classification
physical damages
Protocols
pubcrawl
network classification model
resilience
Resiliency
SCADA
SCADA systems
SCADA-based Systems
Scalability
telecommunication traffic
testbed
cybersecurity experiments
computer network security
computer security
container-based SCADA testbed
Containers
critical infrastructure
critical infrastructures
cyber physical systems
cyber-attacks
ARP Spoofing
Docker
experimental testbeds
financial damages
interoperable platform
learning (artificial intelligence)
machine learning
man in the middle attack
MITM Attack
biblio
CRA: Enabling Data-Intensive Applications in Containerized Environments
Submitted by grigby1 on Fri, 12/11/2020 - 3:01pm
cloud-edge applications
Metadata Discovery Problem
resource orchestration capabilities
Kubernetes/Docker
Kubernetes
generic dataflow layer
Docker
dataflow processing
Data-Intensive Applications
containerization technologies
containerization
common runtime for applications
cloud-scale data centers
Cloud Computing
data centers
distributed
computer centres
Compositionality
Containers
Libraries
Runtime
metadata
Scalability
Resiliency
resilience
pubcrawl
biblio
Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments
Submitted by grigby1 on Thu, 10/29/2020 - 11:59am
live migrations
Virtualization
vehicular cloud computing
Vehicular cloud
VCC
untrustworthy IoT environments
Task Analysis
security
Resiliency
resilience
pubcrawl
mobile ad-hoc networks
Metrics
MANETs
manet privacy
Ad-hoc Cloud
IoT networks
IoT devices
IoT
Intrusion Detection
Internet of Things
Fog computing
fog architecture
edge computing
Containers
computer network security
computer architecture
computational devices
Compositionality
Cloud Computing
biblio
PrivAnalyzer: Measuring the Efficacy of Linux Privilege Use
Submitted by aekwall on Mon, 10/26/2020 - 11:46am
formal verification
Linux Operating System Security
term rewriting
ROSA model checker
privileged open source programs
privilege escalation attacks
PrivAnalyzer
LLVM-based C/C++ compiler
Linux privileges
Linux privilege use
ChronoPriv
AutoPriv
operating systems
dynamic analysis
verification
static analysis
security
program compilers
Predictive Metrics
program diagnostics
Containers
Analytical models
tools
Metrics
composability
pubcrawl
Resiliency
Linux
Program processors
Access Control
security of data
biblio
Adding Custom Sandbox Profiles to iOS Apps
Submitted by aekwall on Mon, 09/21/2020 - 3:47pm
Containers
confinement
third party application
custom sandbox profiles
containment principle
confinement architecture
attack prevention mechanisms
ios
mobile devices
Mobile communication
smart phones
security of data
cyber-physical systems
privacy
composability
pubcrawl
Resiliency
system monitoring
mobile computing
Kernel
Access Control
biblio
Sandnet: Towards High Quality of Deception in Container-Based Microservice Architectures
Submitted by aekwall on Mon, 09/21/2020 - 3:46pm
Attack Strategies
confinement
vulnerable production network
suspicious microservices
security incidents
sandnet
sandbox network
quarantined services
QoD
Production systems
open production network
network deception mechanisms
live confinement
evaluation scenario
container-based microservice architectures
Cloning
computer network security
Degradation
Switches
computer viruses
Containers
cyber-physical systems
sandboxing
Measurement
threat intelligence
privacy
Production
composability
pubcrawl
Resiliency
system monitoring
security
biblio
Efficiency Assessment of the Steganographic Coding Method with Indirect Integration of Critical Information
Submitted by grigby1 on Fri, 09/18/2020 - 1:47pm
image media image
digital video data platform
Discrete Cosine Transformation (DCT)
discrete cosine transformation matrix
discrete cosine transforms
efficiency assessment
embedded critical data
embedded data resistance
embedded digital data
encoding embedding
image container
image fragment
digital representation
Koch methods
Lakes
quantization coefficient
steganographic coding
steganographic coding method
steganographic embedding
structural elements
transformed image
weight coefficients
Zhao methods
Image reconstruction
security
pubcrawl
resilience
Resiliency
matrix algebra
Cryptography
Containers
Metrics
Compositionality
visualization
Image coding
Comparative Analysis
Steganography
distortion
coding theory
built-in containers
code structures
container.
critical information
data extraction
digital data container
digital platform
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »