Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer security
biblio
Overview of Firewalls: Types and Policies: Managing Windows Embedded Firewall Programmatically
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
Protocols
network security
Open Port
operating systems (computers)
Packet
Packets filtering
Ports (Computers)
preconfigured rules
private networks
network attacks
pubcrawl
resilience
Resiliency
security
Windows
Windows embedded firewall
Windows operating system
firewalls
composability
computer network security
computer security
Filtering
firewall
Firewall Exception
firewall policies
firewall rules
Authorize Application
Firewalls (computing)
firewalls types
internet
IP networks
Metrics
microsoft windows
Network
biblio
Models of Reliability of Fault-Tolerant Software Under Cyber-Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
Software
on-demand software
Probabilistic logic
probabilistic model
pubcrawl
resilience
Resiliency
Scalability
security of data
noncompromised software
software fault tolerance
software fault-tolerance
software maintenance
software maintenance policies
software reliability
sophisticated synchronized attacks
synchronized attacks system reliability
telecommunication security
fault tolerant architecture
adversary
Adversary Models
computer security
cyber-attacks
cyber-security controls
diverse software
failure regions
fault tolerance
adequate adversary model
Fault tolerant systems
fault-tolerant software
Human behavior
independent attacks
industrial control applications
industrial protection systems
Metrics
biblio
Cumulative Prospect Theoretic Study of a Cloud Storage Defense Game against Advanced Persistent Threats
Submitted by grigby1 on Mon, 03/19/2018 - 1:55pm
Resiliency
framing effect
game theory
Games
Human behavior
Metrics
Nash equilibria
probability
probability weighting effect
pubcrawl
resilience
expected utility theory
Scalability
scan interval
security of data
storage devices
storage management
subjective attacker
targeted attacks
uncertain attack durations
utility theory
computer security
privacy
advanced persistent threat
advanced persistent threats
APT attacker
APT defense game
attack interval
Cloud Computing
cloud storage
cloud storage defense game
Computing Theory
Conferences
CPT
cumulative decision weights
cumulative prospect theoretic study
cumulative prospect theory
data privacy
Decision Making
discrete decision weights
distortion
biblio
A Multi-Level Secure File Sharing Server and Its Application to a Multi-Level Secure Cloud
Submitted by grigby1 on Mon, 03/19/2018 - 1:34pm
multilevel secure file sharing server
Servers
security of data
Security kernel
Secure File Sharing
Resiliency
resilience
pubcrawl
Peer-to-peer computing
Network file service
Multi-Level Security
Cloud Computing
multilevel secure cloud
Metrics
Kernel
Human behavior
GEMSOS
file servers
data sharing
computer security
computer architecture
composability
biblio
Automatic Mapping of Cyber Security Requirements to Support Network Slicing in Software-Defined Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:12pm
network slicing
ubiquitous networks
ubiquitous computing
standards
Software-Defined Networks
software defined networking
social lives
security related standards
security related incidents
security
Resiliency
resilience
quality of service
pubcrawl
next generation networks
next generation network management
automatic mapping
Metrics
Industries
industrial automation domain
future-proof network management
future-proof approach
future network management paradigms
dynamic networks
cyber security requirements
cyber security QoS requirements
computer security
computer network security
computer network management
composability
automation
biblio
Automatic Mapping of Cyber Security Requirements to Support Network Slicing in Software-Defined Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
network slicing
ubiquitous networks
ubiquitous computing
standards
Software-Defined Networks
software defined networking
social lives
security related standards
security related incidents
security
Resiliency
resilience
quality of service
pubcrawl
next generation networks
next generation network management
automatic mapping
Metrics
Industries
industrial automation domain
future-proof network management
future-proof approach
future network management paradigms
dynamic networks
cyber security requirements
cyber security QoS requirements
computer security
computer network security
computer network management
composability
automation
biblio
Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
security of data
Industrial Control Systems
Integrated circuit modeling
legacy systems
Metrics
process invariants
pubcrawl
resilience
Resiliency
security
industrial control
security requirements
security specifications
software maintenance
timed automata
UPPAAL
Valves
water supply
water treatment
computer security
and Cyber Physical Systems
Attack detection
attack detection mechanisms
automata
automata theory
Clocks
coding theory
Compositionality
6-stage operational water treatment plant
critical infrastructure
Cryptography
Cyber Attack Detection
cyber attack prevention
cyber security
formal methods
formal verification
ICs
biblio
Network Intrusion Detection for Cyber Security Using Unsupervised Deep Learning Approaches
Submitted by grigby1 on Tue, 02/27/2018 - 2:40pm
composability
computer security
encoding
feature extraction
Intrusion Detection
machine learning
privacy
pubcrawl
resilience
Resiliency
Training
biblio
Application of Deep Learning Technique for Automatic Data Exchange with Air-Gapped Systems and Its Security Concerns
Submitted by grigby1 on Tue, 02/27/2018 - 2:28pm
DHT11 sensor
security
Resiliency
resilience
pubcrawl
Metrics
Internet of Things
Humidity
Human Factors
Human behavior
Air gaps
DH-HEMTs
deep learning
data exchange
Conferences
computer security
composability
Arduino board
Air-Gapped Systems
biblio
Provable security analysis of complex or smart computer systems in the smart grid
Submitted by grigby1 on Wed, 02/21/2018 - 1:50pm
smart computer systems
power engineering computing
power system security
provable security analysis
pubcrawl
Radiation detectors
resilience
Resiliency
Scalability
security of data
simple promela interpreter
Ports (Computers)
Smart Grid
smart grid security
smart power grids
smart system
SPIN
Temporal Logic
temporal logics
Transition System
TS
Formal Specification
access control mechanism
ACM
authorisation
automata
automata theory
Büchi Automaton
computer security
formal security
formal security analysis
provable security
formal verification
FSA
Linear Temporal Logics
LTL
Mathematical model
Metrics
model checking
operating system
OS
« first
‹ previous
…
26
27
28
29
30
31
32
33
34
…
next ›
last »