Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
Automated computer network defence using ARMOUR: Mission-oriented decision support and vulnerability mitigation
Submitted by grigby1 on Tue, 01/23/2018 - 4:01pm
Proactive Cyber Defence
infrastructure data analysis
Mission Assurance
mission-context information
near real-time defensive cyber operations
network operators
network responses
network topology
network-based CoA
network-based courses-of-action
Defence Research and Development Canada
pubcrawl
Resiliency
Responsive Cyber Defence
security
situational awareness
Software
Software Vulnerability Mitigation
vulnerability mitigation
Cyber Attacks
Automated computer network defence
Automated Cyber Defence
automated mission-oriented decision support
Automated Response Actions
composability
Computational modeling
computer architecture
computer network security
computer networks
ARMOUR
cyber defence integration framework
cyber defence science-and-technology platform
data analysis
Data models
data sources
Decision Making
decision support
Decision support systems
biblio
A security criteria regulation middleware using security policy for Web Services on multi-Cloud tenancies
Submitted by grigby1 on Tue, 01/23/2018 - 3:28pm
Mobile Cloud middleware
web services
Web service governance
security of data
security criteria regulation middleware
security criteria regulation
security
pubcrawl
policy-based governance
Policy Based Governance
Policy
PGP
PDP
Organizations
multicloud tenancies
asset consumer security profiles
middleware
ESB-integrated middleware
cumbersome policy files
computing power
computing functionality
computer architecture
component
complex composite service
colosum scaling property
collaboration
Cloud Computing
attribute-based security policy model
attribute-based security policy
biblio
VSOC - A Virtual Security Operating Center
Submitted by grigby1 on Tue, 01/23/2018 - 3:07pm
Monitoring
Metrics
computer architecture
Computational modeling
composability
Cloud Computing
Big Data
Operating systems security
pubcrawl
real-time systems
Resiliency
security
biblio
Policy-Customized: A New Abstraction for Building Security as a Service
Submitted by grigby1 on Tue, 01/16/2018 - 6:34pm
Resiliency
Virtual machining
Virtual machine monitors
Trusted Cloud Service
Servers
security policies
Security on Demand
security
Scalability
Cloud Computing
Remote Attestation
pubcrawl
Protocols
Policy-Customized
Pervasive Computing Security
Metrics
Human Factors
computer architecture
biblio
DDoS attack isolation using moving target defense
Submitted by grigby1 on Tue, 01/16/2018 - 6:31pm
Attack proxy
automation
Bandwidth
Computational modeling
computer architecture
Computer crime
Insider assisted DDoS attack
Metrics
moving target defense
MTD
pubcrawl
Resiliency
Servers
Shuffling
biblio
Multi-agent based intrusion prevention and mitigation architecture for software defined networks
Submitted by grigby1 on Tue, 01/16/2018 - 6:29pm
multi-agent system
Topology
Software Defined Networks
Software
security
Resiliency
real-time systems
pubcrawl
network topology
composability
Metrics
Knowledge engineering
Intrusion Detection
Human behavior
DDoS Attack Prevention
DDoS
computer architecture
biblio
A Hierarchical Architecture for Distributed Security Control of Large Scale Systems
Submitted by grigby1 on Tue, 01/16/2018 - 6:25pm
software applications
Metrics
Monitoring
nonfunctional requirements
pubcrawl
Resiliency
Security Control
security controllers
security rules complexity
Malicious Traffic
Software Architecture
software complexity
Software systems
Sparks
telecommunication traffic
traffic load
web applications
computer network security
Big Data
Business
Cloud Computing
Complexity theory
composability
computational complexity
computer architecture
Computer crime
Attack detection
DDoS
DDoS attack detection
distributed security control
functional requirements
hierarchical distributed architecture
Human behavior
Large Scale Systems
biblio
Towards comprehensive protection for OpenFlow controllers
Submitted by grigby1 on Wed, 01/10/2018 - 12:24pm
Cross Layer Security
Virtual machine monitors
telecommunication control
security
Resiliency
pubcrawl
operating systems
OpenFlow critical component
OpenFlow controller
malicious controller
Industrial Control Systems
dynamic networks
adaptive networks
cross layer diversity
control systems
control plane-data ploane decoupling
control logic
computer network security
Computer bugs
computer architecture
composability
Attack vectors
agile networks
biblio
Immediate Attribute Revocation in Decentralized Attribute-Based Encryption Access Control
Submitted by grigby1 on Thu, 12/28/2017 - 1:40pm
decentralized CP-ABE
Software Architecture
security scalability
security degradations
Scalability
revocation
pubcrawl
multi-authority architecture
Multi-authority
group sharing applications
flexible access policies
encryption
Access Control
decentralized attribute-based encryption access control
data confidentiality
Cryptography
cryptographic method
computer architecture
Companies
cloud environment
Cloud Computing
authorization
attribute-based encryption
attribute revocation
biblio
A distributed software-defined multi-agent architecture for unifying IoT applications
Submitted by grigby1 on Thu, 12/28/2017 - 1:40pm
actuators
computer architecture
Distributed Multi-Agent Architecture
flexibility
heterogeneity
Internet of Things
interoperability
Protocols
pubcrawl
Scalability
security
security scalability
sensors
Software-Defined Agent
« first
‹ previous
…
47
48
49
50
51
52
53
54
55
…
next ›
last »