Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer security
biblio
Enabling Collaborative Research for Security and Resiliency of Energy Cyber Physical Systems
Submitted by BrandonB on Tue, 05/05/2015 - 11:09am
energy cyber physical systems
wide-area situational awareness experiment
security of data
power systems
power grids
Power Grid
power engineering computing
Phasor measurement units
fault tolerant computing
Experimentation
collaboration
Energy
Data models
cyber physical systems
cyber physical system security
cyber physical system resiliency
computer security
Communities
collaborative research
biblio
Securing intelligent substations: Real-time situational awareness
Submitted by BrandonB on Tue, 05/05/2015 - 11:09am
Monitoring
Substations
substation intrusion detection-prevention system
substation automation
SIEM system
SIEM
security of data
security information and event management system
real-time systems
real-time situational awareness
Protocols
power engineering computing
computer security
IPS
intelligent substation
IEC61850
IDS
IDPS
electrical distribution companies
DNP3
cyber security
critical infrastructure system
critical infrastructure cyber security defense system
critical infrastructure
biblio
Staffing for Security: Don't Optimize
Submitted by BrandonB on Tue, 05/05/2015 - 10:51am
botnets
computer security
Data Security
Economics
IT security employees
Organizations
Personnel
privacy
security
security of data
security threats
software development
staff allocation optimization
staffing
biblio
Toward a Science of Secure Environments
Submitted by BrandonB on Tue, 05/05/2015 - 10:43am
environmental security
Systems Security
software security
security of data
security
secure environments
Science of Security
optimisation
network security
modeling
fundamental science
formal security
agile systems
detection mechanisms
Decision Making
cyber-decision-making
cyber security collaborative research alliance
cyber environment
continuous optimization problem
computer security
Computational modeling
Communities
Approximation methods
biblio
Cyber Maneuvers and Maneuver Keys
Submitted by BrandonB on Tue, 05/05/2015 - 10:20am
computer security
Cryptography
cyber maneuvers
cyber security system
encryption
encryption algorithm
Hardware
Intrusion Detection
Jamming
maneuver keys
moving-target defenses
proactive network change
proactive strategy
reactive network change
secure rekeying
spread-spectrum key
biblio
Defense on the Move: Ant-Based Cyber Defense
Submitted by BrandonB on Tue, 05/05/2015 - 10:19am
Mobile communication
target tracking
Swarm Intelligence
Statistics
security of data
protected infrastructure
Particle swarm intelligence
optimisation
MTD
moving-target defense
mobile resilient defense
ant-based cyber defense
malware
digital ants
Detectors
defended systems
Database systems
Cyberspace
Cybersecurity
computer security
Computer crime
biblio
Moving-Target Defenses for Computer Networks
Submitted by BrandonB on Tue, 05/05/2015 - 10:15am
attack
Complexity theory
Computer crime
computer network protection
computer network security
computer security
Cyberspace
moving-target defense
moving-target defenses
MTD
network security
security approach
static target
system security
target
target tracking
biblio
App vetting systems: Issues and challenges
Submitted by BrandonB on Tue, 05/05/2015 - 9:55am
computer security
information technology
Laboratories
Mobile communication
Mobile handsets
NIST
biblio
Information Security in Big Data: Privacy and Data Mining
Submitted by BrandonB on Tue, 05/05/2015 - 8:34am
decision maker
tracking
sensitive information
security of data
Provenance
privacypreserving data mining
privacy-preserving data mining
privacy preserving data mining
privacy auction
privacy
PPDM
information security
information protection
game theory
Algorithm design and analysis
data publishing
data provider
Data protection
data privacy
Data mining
data miner
data collector
data acquisition
computer security
Big Data
anti-tracking
anonymization
biblio
The deployment of attribution agnostic cyberdefense constructs and internally based cyberthreat countermeasures
Submitted by BrandonB on Mon, 05/04/2015 - 1:18pm
government personnel
threat identification framework
security of data
proactive framework
private business
physical weapons
malicious actor
Law
internet
international norms
international constructs
internally based cyberthreat countermeasures
active cyberdefense
Government
Educational institutions
cyberweapons
Cyberspace
cyberdefenders
cyber domain
computer security
attribution agnostic cyberdefense constructs
attribution agnostic cyberdefense construct
anonymity protection
Active Defense
« first
‹ previous
…
33
34
35
36
37
38
39
40
41
next ›
last »