Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Windows operating system
biblio
System of Collection and Analysis Event Log from Sources under Control of Windows Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 2:42pm
Metrics
Windows Operating System Security
universal system
the monitoring center
system monitoring
Servers
security of data
security information
Resiliency
resilience
received events
pubcrawl
Protocols
operating systems (computers)
operating systems
monitoring events
Windows operating system
Information systems
information security
Industrial engineering
event-forwarding technology
event sources
event management
event log analysis
event log
event forwarding technology
event collector
domain controller
computer security
composability
analysis of incidents
security
biblio
Exploring the Possibility of USB based Fork Bomb Attack on Windows Environment
Submitted by grigby1 on Fri, 04/17/2020 - 11:28am
Metrics
Windows Operating System Security
Windows operating system
Windows environment
Windows
USB flash drive devices
USB based Fork Bomb attack
USB attack
system buses
security of data
Resiliency
resilience
pubcrawl
primary storage devices
operating systems (computers)
Arduino Pro Microdevice
memory performance
media exchanges
fork bomb
flash memories
electronic data interchange
digital storage
device drivers
data storage
data exchange devices
Computer crime
composability
Attack vectors
attack vector
biblio
An Innovative Model (HS) to Enhance the Security in Windows Operating System - A Case Study
Submitted by grigby1 on Fri, 04/17/2020 - 11:27am
NT LAN manager
Windows Registry
Windows Operating System Security
Windows operating system
Windows
SAM security account manager
SAM file protection
Resiliency
resilience
pubcrawl
privacy
password
NTLM
attacks
Microsoft Windows (operating systems)
Metrics
message authentication
login credentials
HS model
force attacks
dictionary attacks
Data Security
Data protection
data integrity
composability
authorisation
biblio
Windows Virtualization Architecture For Cyber Threats Detection
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
Virtual machine monitors
prediction tool
prediction tools development
pubcrawl
Real-time monitoring
Resiliency
Rootkits
static methods
system monitoring
target Windows machines
virtual machine introspection
Microsoft Windows (operating systems)
virtual machines
virtual memory introspection
Virtualization
VMI
Windows operating system
Windows Operating System Security
Windows OS
Windows threat detection
Windows virtualization architecture
Xen hypervisor
machine learning
composability
cyber breaches
cyber threats detection
Cybersecurity
data structures
hidden security issues
invasive software
Kernel
kernel data structures
learning (artificial intelligence)
alert system administrators
machine learning techniques
malicious process behavior
malware
malware detection
malware threats
memory data structure identification
memory forensic analysis
Metrics
microsoft windows
biblio
Hidden Process Detection for Windows Operating Systems
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
opened windows based method
Windows operating system
user mode
system call based method
software development
security of data
security
rootkit
Resiliency
resilience
pubcrawl
PID based method
operating system kernels
audit system
monitoring system
Monitoring
Microsoft Windows (operating systems)
Metrics
Libraries
information security monitoring
Indexes
hidden process detection
descriptor based method
data encapsulation
Computational efficiency
composability
biblio
Mitigating Cyber Security Attacks by Being Aware of Vulnerabilities and Bugs
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
software programs
private data
program debugging
pubcrawl
resilience
Resiliency
security
security of data
software bugs
prevention techniques
tools
user bank accounts
valuable assets
virtualized system
Vulnerabilities and Bugs
vulnerability concepts
vulnerable applications
Windows operating system
Kali Linux
attack methodologies
composability
Computer bugs
cyber security
cyber security attacks
cyber-attack
defence strategies
internet
antivirus software
Linux
Metasploit Framework
Metrics
Nmap
operating system level
Penetration Test
Penetration Testing
biblio
Cluster-Based Vulnerability Assessment Applied to Operating Systems
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
Predictive models
Windows operating system
Windows
vulnerability records
vulnerability assessment
Stochastic processes
software reliability models
software reliability
Software
security
Resiliency
resilience
pubcrawl
clustering
OSs
operating systems
nonhomogeneous Poisson process
monotonic intensity function assumption
Metrics
mean value function
Linux
Databases
Curve fitting
Correlation
composability
biblio
Unified Approach for Operating System Comparisons with Windows OS Case Study
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
Three-dimensional displays
operational level benchmarking
operational level performance
OS security features
pubcrawl
resilience
Resiliency
security
security of data
operating systems (computers)
unified approach
unified benchmarking approach
Windows 7
Windows 8
Windows operating system
Windows OS
Windows OS case study
Windows XP
graphics processing units
Benchmark testing
Benchmarking
composability
conventional personal computer
DirectX 11
efficient benchmark systems
gpu
Graphics
automated benchmarking tools
Hardware
hardware level
hardware technology
Metrics
microsoft windows
operating system
operating systems
biblio
Overview of Firewalls: Types and Policies: Managing Windows Embedded Firewall Programmatically
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
Protocols
network security
Open Port
operating systems (computers)
Packet
Packets filtering
Ports (Computers)
preconfigured rules
private networks
network attacks
pubcrawl
resilience
Resiliency
security
Windows
Windows embedded firewall
Windows operating system
firewalls
composability
computer network security
computer security
Filtering
firewall
Firewall Exception
firewall policies
firewall rules
Authorize Application
Firewalls (computing)
firewalls types
internet
IP networks
Metrics
microsoft windows
Network
biblio
Using VisorFlow to Control Information Flow Without Modifying the Operating System Kernel or Its Userspace
Submitted by grigby1 on Mon, 03/26/2018 - 12:57pm
composability
Information Flow Control
Metrics
pubcrawl
resilience
Resiliency
security
virtual-machine introspection
Windows operating system
« first
‹ previous
1
2
3
next ›
last »