Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
concurrency and timing
biblio
Limiting Recertification in Highly Configurable Systems: Analyzing Interactions and Isolation Among Configuration Options
Submitted by Pfeffer Juergen on Wed, 09/17/2014 - 5:32pm
Certification
Concurrency and Timing
ACM CCS
certification
composability
concurrency and timing
configuration options
cyber security
Formal Methods and Theory of Security
foundations
Logic and Verification
network analysis
Science of Security
Security Metrics
validation and verification
ACM CCS
Cyber Security
Formal Methods and Theory of Security
Logic and Verification
biblio
InViz: Instant Visualization of Security Attacks
Submitted by llayman on Wed, 09/17/2014 - 5:31pm
Concurrency and Timing
Real-time Systems
Real-Time Coordination
Science of Security
Foundations
ACM CCS
concurrency and timing
Cyber Attacks
cyber security
Cybersecurity
foundations
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
log file
real-time analysis
Real-Time Coordination
real-time systems
Science of Security
visualization
ACM CCS
Cyber Attacks
Cyber Security
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
biblio
Analyzing an Adaptive Reputation Metric for Anonymity Systems
Submitted by Nikita Borisov on Wed, 09/17/2014 - 5:31pm
Concurrency and Timing
Resilient Systems
Science of Security
Foundations
ACM CCS
anonymity
concurrency and timing
Database and Storage Security
Formal Methods and Theory of Security
foundations
Information Accountability and Usage Control
PID controller
Reputation Model
Resilient Systems
Science of Security
Security Metrics
Tor Network
ACM CCS
Database and Storage Security
Information Accountability and Usage Control
Formal Methods and Theory of Security
Security Metrics