Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Science of Security
biblio
Comprehensive VM Protection Against Untrusted Hypervisor Through Retrofitted AMD Memory Encryption
Submitted by grigby1 on Mon, 11/02/2020 - 11:40am
encryption
Hardware
Memory management
pubcrawl
Science of Security
Virtual machine monitors
Virtualization
biblio
Bridging The Gap: Data Exfiltration In Highly Secured Environments Using Bluetooth IoTs
Submitted by grigby1 on Fri, 08/07/2020 - 3:38pm
invasive software
unprecedented threats
strict security policies
Software
sensitive information
sensitive environments
security standard
security measures
security
Science of Security
pubcrawl
professional networks
Payloads
malicious actor
IoT devices
IoT
air gapped network
Internet of Things
insecure IoT
Image color analysis
home networks
highly secured network
free-space optical communication
Data Exfiltration
Cryptography
computer network security
Browsers
botnets
Bluetooth smart bulb
Bluetooth IoT
Bluetooth
biblio
Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs
Submitted by FengjunLi on Thu, 07/09/2020 - 2:03am
Science of Security
2019: October
Cloud-Assisted IoT Systems Privacy
KU
Resilient Architectures
Science of Security
Resilient Architectures
KU
Cloud-Assisted IoT Systems Privacy
2019: October
biblio
Leakage Resilient Searchable Symmetric Encryption with Periodic Updation
Submitted by grigby1 on Wed, 03/18/2020 - 12:14pm
Cloud Computing
encryption
Indexes
Protocols
pubcrawl
Science of Security
Servers
biblio
SDN Enabled Secure IoT Architecture
Submitted by grigby1 on Wed, 03/18/2020 - 11:59am
authentication
computer architecture
control systems
Internet of Things
Logic gates
Protocols
pubcrawl
Science of Security
biblio
HackerNets: Visualizing Media Conversations on Internet of Things, Big Data, and Cybersecurity
Submitted by grigby1 on Wed, 03/18/2020 - 11:52am
Social network services
Science of Security
Human behavior
resilience
Resiliency
Metrics
Policy-Governed Secure Collaboration
collaboration
composability
pubcrawl
Venn Diagram
Internet of Things
Social Media Mining
Media User Network
interactive visualization
Data visualization
Cybersecurity
computer science
Big Data
computer security
Scalability
biblio
Incentive Contract for Cybersecurity Information Sharing Considering Monitoring Signals
Submitted by grigby1 on Wed, 03/18/2020 - 11:51am
Incentive Model
Science of Security
Human behavior
resilience
Resiliency
Metrics
Policy-Governed Secure Collaboration
collaboration
composability
pubcrawl
Moral Hazard
monitoring signals
Insurance
information sharing output
information management
security of data
Incentive mechanism
incentive contract
ethics
Environment monitoring
cybersecurity information sharing
cybersecurity information haring
cyber risk transfer
Cyber Insurance
contracts
computer security
Scalability
risk management
Monitoring
biblio
A Self-Attention-Based Approach for Named Entity Recognition in Cybersecurity
Submitted by grigby1 on Wed, 03/18/2020 - 11:51am
machine learning
Science of Security
Human behavior
resilience
Resiliency
Metrics
Policy-Governed Secure Collaboration
collaboration
composability
pubcrawl
Self-Attention mechanism
Scalability
Labeling
Hidden Markov models
feature extraction
entity recognition
CRF
Context modeling
BiLSTM
Cybersecurity
computer security
biblio
Initial Validation of the Cybersecurity Concept Inventory: Pilot Testing and Expert Review
Submitted by grigby1 on Wed, 03/18/2020 - 11:51am
Instruments
tools
Science of Security
Scalability
Resiliency
resilience
Reliability
pubcrawl
Policy-Governed Secure Collaboration
Metrics
Interviews
assessment validation.
Human behavior
education
cybersecurity education
Cybersecurity Concept Inventory (CCI)
Cybersecurity Assessment Tools (CATS) Project
computer security
composability
collaboration
Cats
biblio
Solving Cybersecurity Problem by Symmetric Dual-Space Formulation—Physical and Cybernetic
Submitted by grigby1 on Wed, 03/18/2020 - 11:51am
symmetric dual-space
Science of Security
Human behavior
resilience
Resiliency
Metrics
Policy-Governed Secure Collaboration
collaboration
composability
pubcrawl
Wireless communication
symmetric Maxwell Equation
symmetric dual-system
symmetric dual-space formulation
security of data
Maxwell equations
Maxwell Equation
Fourier transforms
Fourier transform
electronic warfare
Electromagnetics
cybersecurity problem
Broadband antennas
5G mobile communication
5G mobile
Cybersecurity
computer security
Scalability
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »