Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Standards organizations
biblio
Estimating Target Distribution in security assessment models
Submitted by grigby1 on Wed, 09/12/2018 - 11:13am
pubcrawl
Vulnerability
target distribution
Standards organizations
security of data
security monitoring system
security assessment
security
Resiliency
resilience
real-time systems
real-time system configuration
business data processing
Organizations
network security assessment models
Monitoring
information security
distributed processing
distributed computing
Databases
Damage Assessment
cyber-attacks
Computers
Computational modeling
biblio
The dose makes the poison \#x2014; Leveraging uncertainty for effective malware detection
Submitted by grigby1 on Fri, 07/06/2018 - 2:05pm
Resiliency
Organizations
OS processes
Plan B
potential malware
promising avenue
pubcrawl
received borderline classifications
resilience
malware
Scalability
sensitive information
software execution
Standards organizations
time-consuming
traditional ML detectors
traditional ML methods
uncertain environment
devastating consequences
AI Poisoning
analyzed benign software
behavioral-based malware detectors
Chameleon
CPU-bound software
deep analysis
deep learning models
Detectors
100 malware samples
effective malware detection
Human behavior
I/O-bound software
Interference
invasive software
learning (artificial intelligence)
Linux
biblio
The optimization method of the integrated management system security audit
Submitted by K_Hooper on Wed, 05/09/2018 - 10:56am
optimization method
Standards organizations
security of data
Security Audits
security
Scalability
Resiliency
pubcrawl
Organizations
organisational aspects
auditing
optimization
optimisation
ISO standards
integrated management system security audit
IMs
Human behavior
Concrete
complex checks
biblio
Security Issues with Certificate Authorities
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
Browsers
Browsers Security
digital signatures
Google
Human behavior
Human Factors
information security
Metrics
pubcrawl
Public key
Resiliency
Scalability
Servers
Standards organizations
Ubiquitous Computing Security
World Wide Web
biblio
Securing Big Data in the Cloud with Integrated Auditing
Submitted by grigby1 on Tue, 02/06/2018 - 1:43pm
Scalability
Integrated
integrated auditing
Metrics
Organizations
Policy
pubcrawl
real-time systems
Resiliency
infrastructure auditing
security
security of data
Standards organizations
Stochastic Computing Security
storage management
tools
transaction log security
access management
Identity management
Human Factors
granular auditing
data storage security
data privacy
data legality
data analysis
cyber threats
Cloud Security
Cloud Computing
cloud
big data security
big data privacy
Big Data
auditing
biblio
Managing Assurance Cases in Model Based Software Systems
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
pubcrawl
vehicle control
traffic engineering computing
tools
Standards organizations
software quality
software development organizations
software assurance
Software
social networks
Scalability
Safety
road vehicles
road safety
reuse
regulatory compliance
assurance cases
model management techniques
model management
model based software systems
ISO standards
ISO 26262 standard
impact assessment
functional safety
financial service
Context
composability
compliance management
co-evolution
Automotive engineering
automotive domain
automobiles
biblio
Towards a conceptual framework for information security digital divide
Submitted by grigby1 on Tue, 01/23/2018 - 3:28pm
Information systems
theoretical levels
system end-users
Standards organizations
security governance
pubcrawl
project management
policy-based governance
Policy
organization security maturity
Organizations
organizational level
organisational aspects
Maturity Capability
access control management approach
information system
Information Security Maturity Level
information security fundamentals
information security digital divide maturity framework
Information Security Digital Divide
information security
Frameworks
Digital divide
critical success factors
conceptual framework
collaboration
Benchmarking
authorisation
biblio
3-Way game model for privacy-preserving cybersecurity information exchange framework
Submitted by grigby1 on Wed, 01/10/2018 - 12:38pm
Human Factors
Standards organizations
Resiliency
pubcrawl
privacy-preservation
privacy
Policy
Organizations
information sanitization
collaboration
Human behavior
Games
game theory
Data Sanitization
Cybersecurity information-sharing
computer security
Compositionality
biblio
Automated white-list learning technique for detection of malicious attack on web application
Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
Logic gates
XSS attack
XML
Web Application Security
WAMG(Web Application Model Generator)
Structured Query Language
Standards organizations
SQL injection attack
semistructured XML case generation
security of data
security
Resiliency
pubcrawl
Organizations
malicious attack detection
maintenance engineering
automated white-list learning technique
learning (artificial intelligence)
internet
Human behavior
HTTP response splitting attack
HTTP request splitting attack
Generators
extensible markup language
Default Deny model(White Listing)
Default allow model (Black Listing)
default allow model
cross site scripting attack
Cross Site Scripting
composability
Buffer overflow attack
biblio
A proven method for identifying security gaps in international postal and transportation critical infrastructure
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
supply chain management
resilince management
risk analysis
security
security gap identification
security risk mitigation
shipping processing facilities
ships
Standards organizations
pubcrawl170112
surface to-air missile system
Transportation
transportation critical infrastructure security
transportation processing facilities
United States Postal Inspection Service
UPU standards
USPIS
worldwide commerce
international scale
critical transportation services
field instrument
global supply chain
Inspection
Instruments
international community
international mail processing centers
international postal infrastructure
critical infrastructures
military aircraft
missiles
National security
Organizations
physical security
physical security assessment method
Postal services
« first
‹ previous
1
2
3
4
5