Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
taxonomy
biblio
Security Patterns from Intelligent Data: A Map of Software Vulnerability Analysis
Submitted by grigby1 on Thu, 08/23/2018 - 11:43am
intelligent data processing
taxonomy
software vulnerability analysis
Software Vulnerability
Software
security vulnerability
security patterns
security of data
security
pubcrawl
program analysis
Analytical models
intelligent data analysis
intelligent data
Industries
Databases
Data models
Cryptography
computational intelligence
Compositionality
composability
biblio
How Good Is a Security Policy against Real Breaches? A HIPAA Case Study
Submitted by grigby1 on Mon, 04/30/2018 - 3:26pm
security breaches
US Health Insurance Portability and Accountability Act
US Department of Health and Human Services
taxonomy
software engineering
software development
social norms
SEMAVER
Semantics
semantic similarity metric
semantic similarity
semantic reasoning
security policies
security of data
accidental misuses
Security and privacy breaches
security
pubcrawl
Ontologies
norm violation
Medical services
Measurement
malicious misuses
inference mechanisms
HIPAA
HHS
cognition
breach ontology
biblio
Cryptography classes in bugs framework (BF): Encryption bugs (ENC), verification bugs (VRF), and key management bugs (KMN)
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
secondary causes
program diagnostics
program verification
proximate causes
pubcrawl
related dynamic properties
resilience
Resiliency
rigorous definitions
Scalability
program debugging
soft-ware weaknesses
Software
software vulnerabilities
software weaknesses
taxonomy
tertiary causes
unambiguous definitions
verification bugs
VRF
cryptography related classes
authentication
attacks
bug classes
Bug taxonomy
bugs framework
clear descriptions
Computer bugs
Cryptography
cryptography classes
BF taxonomy
developed BF classes
ENC
encryption
Encryption bugs
Human behavior
key management
key management bugs
KMN
Metrics
biblio
Critical Analysis in the Research Area of Insider Threats
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
Insider Threats
unintentional internal information security violation
taxonomy
Stress
Resiliency
pubcrawl
psychology
policy-based governance
Organizations
Monitoring
Metrics
Analytical models
insider threat modelling
insider espionage
insider behavior forecasting
Information systems
information security
Human Factors
Human behavior
detection of potential insiders
cyber sabotage
collaboration
biblio
Analysis of DDoS-capable IoT malwares
Submitted by grigby1 on Mon, 12/04/2017 - 12:57pm
botnets
Compositionality
Computer crime
IP networks
malware
Metrics
pubcrawl
Resiliency
taxonomy
biblio
Predicting buffer overflow using semi-supervised learning
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Human Factors
vulnerability detection
taxonomy
software security
Semisupervised learning
semi-supervised learning
security of data
Resiliency
pubcrawl
pattern classification
Metrics
machine learning
learning (artificial intelligence)
Indexes
22-dimension vector extraction
Human behavior
Compositionality
Complexity theory
Clustering algorithms
classifier training
C/C++ source files
Buffer storage
Buffer overflows
buffer overflow vulnerability prediction
buffer overflow
AST
arrays
Antlr
biblio
Towards A Taxonomy of Autonomous Vehicle Handover Situations
Submitted by grigby1 on Thu, 04/20/2017 - 12:45pm
autonomous vehicles
composability
Handover
Metrics
pubcrawl
Resiliency
situational awareness
taxonomy
transition
biblio
Object event visibility for anti-counterfeiting in RFID-enabled product supply chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
object-centric coding mechanism
track-and-trace
taxonomy
system architecture framework
supply chains
supply chain management
Supply Chain
security measures
security
RFID-enabled product supply chain visibility
radiofrequency identification
pubcrawl170112
production engineering computing
anti-counterfeiting
object-based event “pedigree”
object event visibility
event pedigree
event exception detection
EPC-based events
Engines
e-pedigree
dynamically updated e-pedigree
Databases
counterfeiting activities
counterfeiting
anticounterfeiting
biblio
Counterfeiting and Defending the Digital Forensic Process
Submitted by grigby1 on Tue, 03/07/2017 - 1:36pm
anti-forensics
antiforensic techniques
Browsers
categorization
Computer crime
Computers
digital evidences
digital forensic process
Digital Forensics
forensic analysis
Forensics
initial phase
mitigation techniques
pubcrawl170109
Software
taxonomy
biblio
A Taxonomy and a Knowledge Portal for Cybersecurity
Submitted by BrandonB on Wed, 05/06/2015 - 10:51am
Cybersecurity
education
systematization
taxonomy
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »