Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data leakage prevention
biblio
One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels
Submitted by grigby1 on Thu, 09/05/2019 - 11:25am
Compositionality
Countermeasure Variation
covert channels
data leakage prevention
Information hiding
network security
Patterns
resilience
Scalability
Steganography
biblio
Automated Verification of Security Chains in Software-Defined Networks with Synaptic
Submitted by grigby1 on Mon, 03/05/2018 - 1:12pm
security management
nuXmv checkers
pubcrawl
resilience
Resiliency
SDN programming languages
security
security chain verification
security chains
security functions
model checking
smart devices
SMT
software defined networking
software-defined networking
Software-Defined Networks
specification translation
Synaptic
veriT
firewalls
Cloud Computing
composability
Computer languages
computer network security
control systems
CVC4
data leakage prevention
dynamic networks
automated verification
formal models
Formal Specification
formal verification
Frenetic family
infrastructure protection
Intrusion Detection Systems
Metrics
Middleboxes
biblio
Automated Verification of Security Chains in Software-Defined Networks with Synaptic
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
security management
nuXmv checkers
pubcrawl
resilience
Resiliency
SDN programming languages
security
security chains
security chain verification
security functions
model checking
smart devices
SMT
software-defined networking
software defined networking
Software-Defined Networks
specification translation
Synaptic
veriT
firewalls
Cloud Computing
composability
Computer languages
computer network security
control systems
CVC4
data leakage prevention
dynamic networks
automated verification
formal models
Formal Specification
formal verification
Frenetic family
infrastructure protection
Intrusion Detection Systems
Metrics
Middleboxes