Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer system
biblio
Choosing the Discipline of Restoring Computer Systems with Acceptable Degradation with Consolidation of Node Resources Saved After Failures
Submitted by grigby1 on Fri, 01/06/2023 - 3:33pm
pubcrawl
resilience
Resiliency
Computational modeling
maintenance engineering
Reliability
fault tolerance
Degradation
Communications technology
computer system
Costs
Systems operation
profitability
recovery
recovery costs
System recovery
biblio
User behavior Pattern -Signature based Intrusion Detection
Submitted by grigby1 on Mon, 03/29/2021 - 12:28pm
Intrusion Detection using Statistics
user suspicious behavior
user behavior Pattern -signature
user authentication
Statistical Based Intrusion Detection
security
Scalability
SBID model
Resiliency
resilience
pubcrawl
PIDE model
pattern recognized engine
Pattern Based Intrusion Detection
particular procedure
main concerned area
authentic user
intrusion detection system
Intrusion Detection
Human behavior
host-based IDS monitors user behavior
extensive system
expert systems
expert system
Engines
digital signatures
computer system
computer network security
Computer hacking
Computational modeling
biometrics (access control)
biometric applications
biblio
Data Security and Confidentiality in Public Cloud Storage by Extended QP Protocol
Submitted by grigby1 on Thu, 05/24/2018 - 11:24am
public cloud storage
internet
outsourcing
outsourcing protocol
Policy
privacy
Privacy Policies
Protocols
pubcrawl
integrity
QP Protocol
Quadratic programming
Scalability
secure outsourcing
secure protocol
security of data
storage management
clients cloud provider
information technology
Human behavior
encryption
data storage
data security correctness
data privacy
data confidentiality
confidentiality
computer user
computer system
cloud technology
cloud computing technology
cloud computing data storage technology
Cloud Computing
cloud access
biblio
Studying cyber security threats to web platforms using attack tree diagrams
Submitted by K_Hooper on Wed, 02/14/2018 - 10:59am
information technology
WordPress vulnerabilities
WordPress platform
Web platforms
Web platform
trees (mathematics)
security threats
security personnel
security of data
Scalability
Resiliency
pubcrawl
Organizations
Open Source Software
Metrics
internet
artificial intelligence security
information systems designers
Information systems
Human behavior
graphical analysis
global reference system
cyber-attack
cyber security threats
Computers
computer system
computer security threats
computer security
common vulnerabilities
Attack Tree method
attack tree diagrams
attack tree