Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Science of Security
biblio
Hypervisor Introspection: Exploiting Timing Side-Channels against VM Monitoring
Submitted by amyclay on Mon, 11/16/2015 - 5:58pm
Science of Security
hypervisor introspection
NSA SoS Lablets Materials
Science of Security
UIUC
virtual machine monitoring
UIUC
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
file
Reliability and Security Monitoring of Virtual Machines using Hardware Architectural Invariants
Submitted by amyclay on Mon, 11/16/2015 - 5:32pm
Science of Security
architectural invariants
Monitoring
virtual machines
NSA SoS Lablets Materials
Science of Security
UIUC
UIUC
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
biblio
Reliability and Security Monitoring of Virtual Machines using Hardware Architectural Invariants
Submitted by amyclay on Mon, 11/16/2015 - 5:30pm
Science of Security
architectural invariants
Monitoring
NSA SoS Lablets Materials
Science of Security
UIUC
virtual machines
UIUC
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
file
Building Reliable and Secure Virtual Machines using Architectural Invariants
Submitted by amyclay on Mon, 11/16/2015 - 5:22pm
Science of Security
architectureal invariants
Cloud Computing
Monitoring
virtual machines
NSA SoS Lablets Materials
Science of Security
UIUC
UIUC
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
biblio
Building Reliable and Secure Virtual Machines using Architectural Invariants
Submitted by amyclay on Mon, 11/16/2015 - 5:22pm
Science of Security
architectureal invariants
Cloud Computing
Monitoring
NSA SoS Lablets Materials
Science of Security
UIUC
virtual machines
UIUC
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
biblio
Modeling Network Medium Access Protocols for Network Quality of Service Analysis
Submitted by Katie Dey on Thu, 11/12/2015 - 1:58pm
Resilient Systems
Science of Security
Foundations
network time-varying performance
Access
analysis
Analytical models
Bandwidth
Calculus
Data models
delays
design-time analysis
distributed real-time embedded system verification
embedded systems
foundations
Medium
Network
network medium channel access protocol
network quality of service analysis
verification
protocol
Protocols
QoS
quality
quality of service
Resilient Monitoring and Control
Resilient Systems
Satellites
Science of Security
Service
SURE Project
TDMA
time division multiple access
time-varying channels
biblio
Integrity Assurance in Resource-bounded Systems Through Stochastic Message Authentication
Submitted by Katie Dey on Thu, 11/12/2015 - 1:53pm
Resilient Systems
Science of Security
Foundations
SURE Project
Cyber risk analysis and incentive design
economics of security
foundations
game theory
Hierarchical Coordination and Control
message authentication
Resilient Monitoring and Control
Resilient Systems
Science of Security
Cyber risk analysis and incentive design
Hierarchical Coordination and Control
Resilient monitoring and control
biblio
Iterative Classification for Sanitizing Large-Scale Datasets
Submitted by Katie Dey on Thu, 11/12/2015 - 1:39pm
Resilient Systems
Science of Security
Foundations
SURE Project
foundations
Hierarchical Coordination and Control
Resilient Systems
Science of decentralized security
Science of Security
Hierarchical Coordination and Control
Science of decentralized security
biblio
Monitoring Stealthy Diffusion
Submitted by Katie Dey on Thu, 11/12/2015 - 1:32pm
Resilient Systems
Science of Security
Foundations
SURE Project
foundations
Hierarchical Coordination and Control
Resilient Systems
Science of decentralized security
Science of Security
Hierarchical Coordination and Control
Science of decentralized security
biblio
Process-Driven Data Privacy
Submitted by Katie Dey on Thu, 11/12/2015 - 1:15pm
Resilient Systems
Science of Security
Foundations
SURE Project
foundations
Hierarchical Coordination and Control
Planning
privacy
re-identification
Resilient Systems
Science of decentralized security
Science of Security
Hierarchical Coordination and Control
Science of decentralized security
« first
‹ previous
…
39
40
41
42
43
44
45
46
47
…
next ›
last »