Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer security
biblio
Cyber-Secure UAV Communications Using Heuristically Inferred Stochastic Grammars and Hard Real-Time Adaptive Waveform Synthesis and Evolution
Submitted by K_Hooper on Wed, 12/20/2017 - 10:31am
Information Reuse
Waveform Analysis and Synthesis
security
Resiliency
Receivers
real-time systems
pubcrawl
Production
Memory management
Adaptive Programming
Hard Real-Time Systems
grammatical inference
Grammar
Expectation-Driven Receiver
Evolutionary Programming
drones
computer security
Case-Based Reasoning
biblio
Active Dependency Mapping: A Data-Driven Approach to Mapping Dependencies in Distributed Systems
Submitted by K_Hooper on Wed, 12/20/2017 - 10:31am
Ecosystems
Software
security
Robustness
Resiliency
Resilience and Robustness
resilience
quantitative assessment
pubcrawl
network performance
network environment
Mission Assurance
interrelated software services
Information Reuse
enterprise networks
Active dependency mapping
distributed systems
distributed processing
dependency relations
dependency analysis
Degradation
Data-driven approach
cyber-physical systems
cyber physical systems
Cyber Dependencies
Conferences
computer security
Automated Dependency Mapping
artificial degradation
biblio
Malware Collection and Analysis
Submitted by K_Hooper on Wed, 12/20/2017 - 10:31am
malware
University of Arizona
security
Resiliency
pubcrawl
National Science Foundation funded project
malware datasets
Malware Collection
Malware Analysis
Androids
invasive software
Information Reuse
Humanoid robots
feature extraction
Data mining
computer security
Big Data
biblio
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
Resiliency
intellectual property theft
Intrusion Detection Systems
Metrics
organisational aspects
Organizations
policy-based governance
psychology
pubcrawl
intellectual property
role-based profile assessment
sensitive organizational data access
synthetic data-driven scenarios
tree data structures
tree-structure profiling
User behavior
user profile assessment
visual analytics tools
data analysis
authorisation
authorized data access
automated insider threat detection system
business data processing
business reputation
collaboration
computer security
cyber security
Anomaly Detection
data visualisation
Electronic mail
feature extraction
financial theft
Human behavior
Human Factors
insider threat
Insider Threats
biblio
Enabling Risk Management for Smart Infrastructures with an Anomaly Behavior Analysis Intrusion Detection System
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
IoT infrastructures security
threat model
software fault tolerance
smart infrastructures
sensors
security of data
Scalability
risk management method
risk management framework
risk management
Resiliency
pubcrawl
mobile devices
mobile computing
Metrics
ABA methodology
IoT
intrusion tolerance
intrusion detection system
Intrusion Detection
Internet of Things
cybersecurity mechanism
cyber security
computer security
Computational modeling
Autonomic Security
Autonomic computing
Anomaly Behavior Analysis methodology
anomaly behavior analysis
biblio
Autonomic computing meets SCADA security
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
architecture
Autonomic computing
Autonomic Security
computer architecture
computer security
critical infrastructures
Cyber Attacks
Handheld computers
machine learning
Metrics
pubcrawl
Resiliency
SCADA Security
SCADA systems
Scalability
Transportation
biblio
Analysis of Cybersecurity Based on Li-Fi in Green Data Storage Environments
Submitted by grigby1 on Mon, 12/04/2017 - 11:58am
industrial networking
storage management
solar power
solar energy source
security of data
Scientific Computing Security
Resiliency
pubcrawl
optical prisms
optical communication
Metrics
Memory
low-cost resources
light-fidelity
Li-Fi
Cloud Computing
industrial network
green protection
Green products
green data storage environment
Green data storage
green data center
green cloud computing
data center
cybersecurity issues
cybersecurity analysis
computer security
Compositionality
Complexity theory
biblio
Cyber security risk management for health-based critical infrastructures
Submitted by grigby1 on Mon, 12/04/2017 - 11:58am
Metrics
Systems
security of data
security
secure recovery
Scientific Computing Security
risk management
Resiliency
recovery
pubcrawl
PhD project
Ontologies
modeling
Biological system modeling
Medical services
health-based critical infrastructures
health care critical infrastructures
health care
Health
cyber-physical systems
cyber-physical security
cyber-physical
critical infrastructures
computer security
Compositionality
biblio
SVED: Scanning, Vulnerabilities, Exploits and Detection
Submitted by grigby1 on Mon, 11/27/2017 - 11:30am
Metrics
vulnerability detection
vulnerabilities
threat intelligence information
SVED
Software
Sensor Systems
security of data
scanning
Resiliency
pubcrawl
Compositionality
malicious actions
Intrusion Detection Systems
Intelligent sensors
Human Factors
Human behavior
exploits and detection tool
distributed architecture
Databases
cyber security experiments
computer security
biblio
Cyber security threats \#x2014; Smart grid infrastructure
Submitted by grigby1 on Mon, 11/27/2017 - 11:25am
security of data
prosumer
Protocols
pubcrawl
R and D
Resiliency
risk evaluation process
SCADA
secure cyber infrastructure
power system security
smart devices
smart grid infrastructure
Smart Grids
smart meters
smart power grids
smart power system
Software
WANs
ICT
computer security
cyber infrastructure
cyber security
cyber security threats
cyber-attack
Demand response (DR)
denial-of-service (DoS)
electronic devices
composability
ICT driven power equipment massively layered structure
Metrics
new generation sensors
NIST
Peak Load Management (PLM)
power grid vulnerability analysis
power system framework
« first
‹ previous
…
30
31
32
33
34
35
36
37
38
…
next ›
last »