Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer security
biblio
A Modeling Method of Cyberspace Security Structure Based on Layer-Level Division
Submitted by grigby1 on Fri, 04/28/2023 - 2:59pm
network topology
level division
layer division
cyberspace security structure
policy governance
Resiliency
computer theory
graph theory
Cyberspace
computational complexity
Compositionality
collaboration
computer security
composability
Topology
Computational modeling
resilience
Metrics
Human behavior
pubcrawl
security
biblio
Secure Polar Coding with Non-stationary Channel Polarization
Submitted by grigby1 on Fri, 04/14/2023 - 2:52pm
Metrics
Secure Coding
Resiliency
resilience
reliability theory
pubcrawl
polar codes
polar code
non-stationary channels
coding theory
encoding
computer security
composability
Complexity theory
Communication Systems
Channel models
channel coding
security
biblio
Open Source Software Computed Risk Framework
Submitted by grigby1 on Fri, 03/31/2023 - 10:21am
pubcrawl
resilience
Correlation
Scalability
Ecosystems
information technology
Big Data
computer security
Measurement
Force
big data security metrics
Resiliency
codes
data analysis
Prediction methods
biblio
Vulnerabilities and Threat Management in Relational Database Management Systems
Submitted by grigby1 on Fri, 03/17/2023 - 11:15am
Cryptography
relational database management systems
Heart
relational database security
Database systems
SQL injection
SQL
computer security
composability
Access Control
encryption
authentication
Safety
Resiliency
resilience
Metrics
Human behavior
pubcrawl
relational databases
biblio
Ransomware Classification and Detection With Machine Learning Algorithms
Submitted by grigby1 on Fri, 03/17/2023 - 11:02am
Conferences
Ransomware Classification
Feature Selection
Ransomware
neural network
Artificial Neural Networks
computer security
composability
Cybersecurity
computer architecture
Resiliency
resilience
Metrics
pubcrawl
machine learning
machine learning algorithms
feature extraction
biblio
“If security is required”: Engineering and Security Practices for Machine Learning-based IoT Devices
Submitted by grigby1 on Tue, 02/28/2023 - 4:51pm
Prototypes
embedded systems
Costs
software engineering
security and privacy
reverse engineering
cyber-physical systems
computer security
composability
Internet of Things
IoT security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
machine learning
Interviews
biblio
Application of an Automotive Assurance Case Approach to Autonomous Marine Vessel Security
Submitted by grigby1 on Fri, 02/17/2023 - 4:40pm
computer security
pubcrawl
resilience
Resiliency
Software
Safety
Scalability
Industries
Cybersecurity
Vehicle safety
cognition
documentation
Regulation
software assurance
assurance case
Automotive Standards
Autonomous Driving
Autonomous marine vessels
biblio
A Novel TCP/IP Header Hijacking Attack on SDN
Submitted by grigby1 on Fri, 02/17/2023 - 4:25pm
pubcrawl
resilience
Resiliency
Conferences
Scalability
computer security
SDN
Middleboxes
SDN security
TCPIP
Middlebox Security
TCP/IP hijacking
biblio
A Framework for SDN Forensic Readiness and Cybersecurity Incident Response
Submitted by grigby1 on Fri, 02/17/2023 - 4:24pm
Telecommunications
SDN Incident Response
SDN Framework
SDN forensics
Evidence
digital forensic
centralized control
Pragmatics
software defined networking
pubcrawl
SDN security
network function virtualization
Forensics
computer security
Scalability
Resiliency
resilience
biblio
SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking Simulation
Submitted by aekwall on Fri, 02/17/2023 - 9:50am
compiler security
Resiliency
Compositionality
Scalability
Metrics
pubcrawl
codes
Computational modeling
computer security
Human Factors
n/a
policy-based governance
Safe Coding
Syntactics
Technological innovation
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »