Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security perspective
biblio
An Optimization Approach to Graph Partitioning for Detecting Persistent Attacks in Enterprise Networks
Submitted by grigby1 on Wed, 03/17/2021 - 12:44pm
attack graphs
Chained Attacks
underlying attack
smaller incidents
skilled adversaries
security-context
security-aware partitions
Persistent attacks
optimization approach
multistep attacks
kill chain progression
graph partitioning
false-positives
enterprise networks
actual attack plan
advanced persistent threats
security of data
Linear programming
security perspective
graph theory
detection algorithms
standards
Topology
Scalability
Correlation
optimization
computer network security
Resiliency
resilience
pubcrawl
security
biblio
Trustworthiness Assessment of Web Applications: Approach and Experimental Study using Input Validation Coding Practices
Submitted by aekwall on Mon, 12/07/2020 - 12:30pm
secure code
web applications
Web application
vulnerabilities
trustworthiness assessment
trustworthiness
software security
software quality
security vulnerabilities
security perspective
security of data
Assessment
quality model
pubcrawl
internet
input validation practices
input validation coding practices
feasible security practices results
composability
coding practices
assessment techniques
biblio
Inclusive Security Models To Building E-Government Trust
Submitted by grigby1 on Fri, 10/16/2020 - 11:14am
nonrepudiation properties
trusted security solution
Trusted Computing
trust of government
trust
security threats
security requirements
security perspective
Resiliency
resilience
pubcrawl
Privacy Requirements
privacy relationships
privacy properties
privacy
policy-based governance
Access Control
message authentication
internet
inclusive security model
inclusive security
Human behavior
government data processing
e-government trust
E-Government
e-gov
data privacy
Cybersecurity
collaboration
authorization
authorisation
authentication
biblio
Security Enhancement in Storage Area Network
Submitted by grigby1 on Fri, 08/28/2020 - 3:55pm
security level
resilience
Resiliency
SAN
SAN Perfromance factors
SAN protocols
SAN security framework
Scalability
security
security enhancement
public clouds
security perspective
security solution
security vulnerabilities
Servers
storage area network
Storage area networks
storage management
storage technologies
information security
cashing technologies
centralized secure place
computer network security
DAS
digital transformation
direct attached storage
Distributed databases
distributed storage technology
geographical remote locations
big data security metrics
IP networks
network attached storage
Optical fiber LAN
Optical fibers
private clouds
private nodes
Protocols
pubcrawl
biblio
Improved IoT Device Authentication Scheme Using Device Capability and Digital Signatures
Submitted by aekwall on Mon, 06/01/2020 - 11:03am
IoT device authentication scheme
Servers
security perspective
Resiliency
resilience
replay attack mitigation
pubcrawl
performance evaluation
multifactor authentication scheme
multifactor authentication
Metrics
man-in-the-middle attack mitigation
IoT device security
IoT device privacy
authentication
Internet-of-Things device authentication
Internet of Things
Human Factors
Human behavior
digital signatures
device capability
device authentication
data privacy
Cryptography
computer network security
authentication server
authentication mechanism
biblio
Realizing Multi-Access Edge Computing Feasibility: Security Perspective
Submitted by aekwall on Mon, 03/02/2020 - 12:30pm
multiaccess edge computing feasibility
cloud computing capabilities
communication devices
efficient data processing architecture
ETSI standards
gigabit-level bandwidth
IoT services
MEC
mobile service platform
Multi-Access Edge Computing (MEC)
security challenges
Radio Access Network
RAN
security perspective
threat vectors
typical MEC deployment scenario
ultra-high storage capacity
ultra-low latency
virtualization technologies
Ubiquitous Computing Security
5G mobile communication
Scalability
virtualisation
Internet of Things
telecommunication security
security
Internet of Things (IoT)
Resiliency
pubcrawl
Metrics
Cloud Computing
radio access networks
telecommunication computing
mobile network
Ambient intelligence
multi-access systems
Human Factors
ubiquitous computing
5G
biblio
Towards Making Systems Forget with Machine Unlearning
Submitted by Katie Dey on Mon, 08/06/2018 - 1:24pm
learning (artificial intelligence)
usability perspective
Training data
summation form
statistical query learning
security perspective
security of data
recommender systems
recommendation engine
privacy risks
machine unlearning
machine learning algorithms
Learning systems
Adversarial Machine Learning
forgetting systems
Forgetting System
Feature Selection
feature modeling
feature extraction
Extraction
data privacy
Data models
data lineage
Computational modeling
complex data propagation network
Cognitive Security
Articles of Interest
Extraction
C3E 2019
biblio
Analysis of Cyber Physical Systems Security via Networked Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:49pm
security
Metrics
MITM
networked attacks
Networked Control System
networked control systems
pubcrawl
resilience
Resiliency
Mathematical model
Security Control
security of data
security perspective
Stealth Attack
system security conditions
telecommunication security
Telecommunications
unified models
cyber-physical systems
actuators
Analytical models
closed-loop security control structure
composability
computer network security
Cyber Attacks
cyber physical systems
Cyber Physical Systems Security
actuator security
defense functions
Denial-of-Service
DoS
Human behavior
information disclosure
Iron
man-in-the-middle attack
biblio
Integration of wireless sensor network and Web of Things: Security perspective
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
Logic gates
sensor security
WSN integration
WoT security issue
Web of Things
smart thing
Sensor
security perspective
Security Challenge
Internet of Things vision
WSN
security threats
control systems
wireless sensor networks
Wireless Sensor Network
security
Wireless communication
computer network security
Computer crime
data privacy
Protocols
composability
Internet of Things
Human Factors
Human behavior
Resiliency
pubcrawl
Metrics
IoT
biblio
A Scalable Threats Classification Model in Information Systems
Submitted by grigby1 on Thu, 04/20/2017 - 12:42pm
information security
Network reconnaissance
pubcrawl
Resiliency
security dimension
security perspective
security risk
security threats
threat classification
1
2
next ›
last »