Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer security
biblio
Privacy Issues in Identity Verification
Submitted by BrandonB on Wed, 05/06/2015 - 12:25pm
identity proofing
wide-scale identity systems
verification
trust creation
privacy issues
privacy
national identity systems
knowledge-based authentication
knowledge management
KBA
imposter fraud
identity verification
identity scoring
biometrics
Identity management
identity fraud
identity document security
identity document fraud
identity credential
Identification
economic system
data privacy
computer security
commercial applications
business data processing
biometrics (access control)
biblio
Reverse Engineering Digital Circuits Using Structural and Functional Analyses
Submitted by BrandonB on Wed, 05/06/2015 - 10:42am
reverse engineering
integrated circuit design
integrated circuits
intellectual property
invasive software
IP theft
IP violation detection
Logic gates
register files
Inference algorithms
SoC design
structural analysis
subtractors
system-on-chip
test circuits
Trojan horses
unstructured netlist
very large highly-optimized system-on-chip design
functional analysis
Algorithm design and analysis
algorithmic reverse engineering digital circuits
combinational elements
computer security
counters
design automation
Digital circuits
formal verification
adders
Globalization
globalized multivendor environment
Hardware
hardware trojans-malware
high-level netlist
ICs
industrial property
biblio
Hardware Trojan Attacks: Threat Analysis and Countermeasures
Submitted by BrandonB on Wed, 05/06/2015 - 10:40am
information processing
Trojan tolerance
Trojan taxonomy
Trojan horses
Trojan detection
threat analysis
side-channel analysis
self-referencing
reactive protection approach
proactive protection approach
invasive software
integrated circuits
Integrated circuit modeling
Circuit faults
hardware Trojan attacks
hardware Trojan attack
hardware obfuscation
Hardware intellectual property (IP) trust
Hardware
global economic trend
fabrication
electronics industry
electronic hardware malicious modifications
computer system security
computer security
biblio
Harnessing the Cloud for Teaching Cybersecurity
Submitted by BrandonB on Wed, 05/06/2015 - 9:55am
cloud
Cloud Computing
computer security
Cybersecurity
long distance education
network security
security
biblio
A Proposed Curriculum in Cybersecurity Education Targeting Homeland Security Students
Submitted by BrandonB on Wed, 05/06/2015 - 9:49am
HS
terrorism studies
Terrorism
security of data
risk management
public sectors
proposed curriculum
private sectors
policy development
Information systems
information security education
information security
computer aided instruction
homeland security students
Homeland security education
higher education
further education
educational courses
education
Cyberspace
cybersecurity education
cyber security principles
Computers
computer security
biblio
Re-engineering Cybersecurity Education in the US: An Analysis of the Critical Factors
Submitted by BrandonB on Wed, 05/06/2015 - 9:48am
Industries
US government
student success factors
security of data
school programs
programmatic factors
NSA
NIST
NICE effort
National Security Agency
National Initiative for Cybersecurity Education
information security
CAE program
Government
Educational institutions
education systems
DHS
Department of Homeland Security
cybersecurity education re-engineering
cyber security professionals
critical factors analysis
computer security
computer science education
biblio
A Steganographic Approach to Localizing Botmasters
Submitted by BrandonB on Wed, 05/06/2015 - 9:19am
internet
Watermarking
Steganography
steganographic approach
Servers
secret cryptographic key
public key cryptography
perpetrator tracking
Organizations
object property
Markov processes
marked money bills
law enforcement
IP networks
IP address
bijective functions
illegal drug dealer tracking
honey token
honey net
encoding
decoy word document
Decoding
covert bits
Computers
computer security
computer network security
chaotic logistic map
botnets
botmaster machine
Botmaster localization
biblio
Vulnerability Assessment in Autonomic Networks and Services: A Survey
Submitted by BrandonB on Wed, 05/06/2015 - 8:51am
Computers
vulnerability management process
Vulnerability Management
vulnerability assessment
security risks
security attacks
security
Monitoring
fault tolerant computing
Autonomic computing
computer security
computer network security
Complexity theory
Business
Autonomic systems
autonomic services
autonomic networks
autonomic management plane
biblio
A Framework for Wide-Area Monitoring and Control Systems Interoperability and Cybersecurity Analysis
Submitted by BrandonB on Tue, 05/05/2015 - 11:37am
nonfunctional quality
wide-area monitoring and control systems (WAMCS)
wide area monitoring and control systems interoperability
WAMC ICT architecture
Unified modeling language
SCADA systems
real time situational awareness
Protocols
power systems
power system security
power system measurement
power system management
open systems
Analytical models
next generation operational management system
Network interfaces
interoperability
information and communication technology
enterprise architecture method
enterprise architecture analysis
Electric Power System
Decision Making
cybersecurity analysis
Cybersecurity
computer security
Communication Systems
biblio
Towards a Methodology for Cybersecurity Risk Management Using Agents Paradigm
Submitted by BrandonB on Tue, 05/05/2015 - 11:28am
Agent Based Paradigm
agents paradigm
Analytical models
business continuity
computer security
cybersecurity risk management
Educational institutions
Informatics
proactive behavior
risk management
SA
security management systems
security of data
sensors
situational awareness
« first
‹ previous
…
33
34
35
36
37
38
39
40
41
next ›
last »