Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
defense
biblio
Trustworthy design architecture: Cyber-physical system
Submitted by K_Hooper on Fri, 02/02/2018 - 10:06am
security patch updates
integrated circuits
physical characteristics
physical component
physically verifiable whitelists
pubcrawl
Resiliency
Resilient Security Architectures
Security Operations Center
Industries
Software
system dependencies
TDA
Trustworthy design architecture
Trustworthy Systems
unclonable digital identity
unique system engineering technique
whitelisted system
cyber identities
authentication
computer architecture
Computer crime
conceptual system engineering framework
conventional cyber defenses
costly functional impact tests
CPS
critical infrastructures
Cyber Dependencies
cyber risks
cyber-physical systems
cyber-physical traits
defense
digital characteristics
digital commands
digitally unclonable function
biblio
An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks
Submitted by grigby1 on Wed, 12/20/2017 - 12:08pm
Phishing
zero-day semantic social engineering attack detection
Zero day attacks
user deception threat
threat detection
technical security countermeasures
Spear-phishing
social engineering
Semantics
semantic social engineering attacks
semantic attacks
security measures
security
Reliability
pubcrawl
Predictive models
application spoofing
multimedia masquerading
machine learning
learning (artificial intelligence)
information security scenarios
Human-as-a-Sensor
human-as-a-security-sensor paradigm
Human Factors
Human behavior
feature extraction
Electronic mail
defense
cyber security
Computer crime
Browsers
biblio
Preventing Page Faults from Telling Your Secrets
Submitted by grigby1 on Tue, 09/19/2017 - 11:21am
channel coding
composability
defense
Hardware Security
Intel SGX
Metrics
pubcrawl
Resiliency
side-channel
biblio
New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks
Submitted by grigby1 on Tue, 09/05/2017 - 12:43pm
attack
composability
defense
IMs
LTE
Metrics
mobile networks
network accountability
pubcrawl
Resiliency
SMS
spam detection
threat mitigation
biblio
A One-Way Proof-of-Work Protocol to Protect Controllers in Software-Defined Networks
Submitted by grigby1 on Mon, 04/03/2017 - 10:54am
attack
composability
defense
Denial-of-Service
internet
Metrics
network control systems
network control systems security
networked control systems
pubcrawl
Resiliency
security
file
Game Theory with Learning for Cyber Security Monitoring
Submitted by awhitesell on Tue, 11/15/2016 - 4:24pm
Defense
Science of Security
defense
game theory
Monitoring
q-learning
Science of Security
UIUC
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
biblio
Game Theory with Learning for Cyber Security Monitoring
Submitted by awhitesell on Tue, 11/15/2016 - 4:22pm
Defense
Science of Security
defense
game theory
Monitoring
q-learning
Science of Security
UIUC
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
forum
ASSURE 2016 Call for Papers - 4th International Workshop on Assurance Cases for Software-intensive Systems
Submitted by gpai on Mon, 04/04/2016 - 4:57pm
CALL FOR PAPERS
Calls for Papers
Architectures
Architectures
Composition
Design Automation Tools
Embedded Software
Defense
Control
Platforms
Energy
Modeling
Systems Engineering
Wireless Sensing and Actuation
Critical Infrastructure
Real-Time Coordination
Health Care
Resilient Systems
Science of System Integration
Robotics
Science of Security
Transportation
Validation and Verification
CPS Technologies
Foundations
assurance cases
Safety-Critical Systems
software-intensive systems
Aerospace
Healthcare
Transportation
defense
automotive
rail
Announcement
biblio
Ethics behind Cyber Warfare: A study of Arab citizens awareness
Submitted by BrandonB on Tue, 05/05/2015 - 10:55am
ethics
technological research centers
security systems
scientific research centers
personal information
offence
military war
military computing
Law
information technology
government data processing
Government
Arab citizens awareness
ethical aspects
despotic government plans
defense
cyber warfare
cyber war
cyber security
cyber attack
cyber army
Computers
Computer hacking
Computer crime
biblio
A new type of intrusion prevention system
Submitted by BrandonB on Tue, 05/05/2015 - 10:55am
active defense intrusion detection system
Communication networks
Computer hacking
computer network security
defense
Interaction honeypot
Intrusion Detection
intrusion prevention system
Logic gates
mixed interactive honeypot
Monitoring
network security
operating systems
Servers
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »