Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security technologies
biblio
Stealthy Injection Attacks Against IEC61850's GOOSE Messaging Service
Submitted by aekwall on Mon, 12/02/2019 - 11:04am
command injection attacks
Time factors
substation automation system
substation automation
stealthy injection attacks
security technologies
SaS
Queueing analysis
QoS requirements
Message service
IEC61850s GOOSE messaging service
generic object oriented substation events messaging service
communications channels
security of data
quality of service
power system security
power engineering computing
IEC standards
Substations
Metrics
composability
pubcrawl
Resiliency
Protocols
security
biblio
Fine-Grained Supervision and Restriction of Biomedical Applications in Linux Containers
Submitted by grigby1 on Wed, 05/09/2018 - 1:53pm
program libraries
medical administrative data processing
medical data processing
Monitoring
multidimensional biosignal recordings normalization
operating system
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
Process Supervision
Linux containers
pubcrawl
sandbox
sandboxing
security
security of data
security technologies
system call filtering
System Call Interception
Containers
application analysis
biomedical application restriction
biomedical data
Cloud Computing
collaboration
complex programs
composability
container portability
algorithm development
data analysis
distributed processing
docker-based container
external code repositories
fine-grained restricted environment
fine-grained supervision
Kernel
Linux
biblio
Lateral Thinking for Trustworthy Apps
Submitted by grigby1 on Fri, 02/02/2018 - 12:29pm
pubcrawl
Trustworthy Systems
trustworthy apps
Trusted Computing
trusted component ecosystem
Substrates
security technologies
security of data
Secure System Design
Resiliency
composability
lateral thinking
Kernel
Isolation technology
Hardware
cyber physical systems
Cryptography
critical infrastructures
critical infrastructure