Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
internet
biblio
Model-Based Attack Tolerance
Submitted by grigby1 on Thu, 12/28/2017 - 12:28pm
message authentication
tools
software-based systems
Robustness
Resiliency
pubcrawl
monitoring method
Monitoring
model-based testing
model-based attack tolerance
Adaptation models
intrusion tolerance
internet
generic approach
formal verification
formal method
composability
authentication Web application
authentication
biblio
Practical Intrusion-Tolerant Networks
Submitted by grigby1 on Thu, 12/28/2017 - 12:21pm
IP networks
Semantics
Routing
Resilient Networks
Resiliency
Reliability
pubcrawl
Power Grid
overlay networks
North America
network infrastructure
Monitoring
malicious attacks
composability
IP infrastructure
intrusion-tolerant overlay implementation
intrusion-tolerant network service
intrusion tolerance
internet
high-value applications
global cloud
Europe
East Asia
critical infrastructure
computer network security
biblio
Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach
Submitted by grigby1 on Thu, 12/28/2017 - 12:21pm
Intrusion Detection
Virtualization
Virtual machining
Virtual machine monitors
security of data
Resiliency
quality of service
QoS
pubcrawl
monitoring techniques
Monitoring
intrusion tolerance
intrusion prevention mechanisms
attack tolerance
internet
H2020 CLARUS project
data confidentiality
data availability
composability
cloud-specific attacks
cloud vulnerabilities
cloud environments
Cloud Computing
cloud
CLARUS approach
attack-tolerance
biblio
Chaos based Combined Multiple Recursive KEY Generator for Crypto-Systems
Submitted by grigby1 on Wed, 12/27/2017 - 11:56am
cryptosystems
Resiliency
pubcrawl
Plain Text
Metrics
Internet usage
Internet security
internet
information security
Generators
Encryption technique
encryption
Decryption Technique
chaos
Cryptography
composability
communication channel threats
combined multiple recursive generator
CMRG
Ciphers
cipher text
chaotic cryptography
chaotic communication
chaos theory
Chaos Function
chaos based combined multiple recursive KEY generator
biblio
Random forest explorations for URL classification
Submitted by grigby1 on Wed, 12/20/2017 - 12:08pm
Phishing
Web sites
URL classification
unsolicited e-mail
Uniform resource locators
Training
testing
Random forest explorations
Radio frequency
pubcrawl
phishing Websites
blacklisting
pattern classification
machine learning algorithms
learning (artificial intelligence)
internet
Human Factors
Human behavior
feature extraction
Computer crime
common defence users
Classification algorithms
biblio
Phishing detection: A recent intelligent machine learning comparison based on models content and features
Submitted by grigby1 on Wed, 12/20/2017 - 12:07pm
pubcrawl
Phishing
phishing attacks
phishing datasets
Phishing Detection
phishing detection rate
Predictive Metrics
Predictive models
predictive security metrics
online community
security
tools
Training
Trusted Computing
trusted Websites
Web sites
Web Threat
World Wide Web
Human behavior
Artificial Neural Networks
Classification algorithms
Computer crime
computer security
data analysis
Decision trees
fake Websites
financial assets
anti-phishing tools
Human Factors
intelligent machine learning comparison
internet
learning (artificial intelligence)
machine learning
ML predictive models
online attack
biblio
Fresh-Phish: A Framework for Auto-Detection of Phishing Websites
Submitted by grigby1 on Wed, 12/20/2017 - 12:07pm
Electronic mail
Human behavior
Human Factors
internet
Kernel
machine learning
malware
Phishing
pubcrawl
Support vector machines
TensorFlow
Uniform resource locators
biblio
FOGG: A Fog Computing Based Gateway to Integrate Sensor Networks to Internet
Submitted by grigby1 on Wed, 12/20/2017 - 12:02pm
wireless sensor networks
sensor security
sensor networks
sensor network integration
network servers
IoT gateway
IoT devices
internetworking
information centric networking
ICN
heterogeneous sensor networks
FOGG
fog computing based gateway
Fog computing
edge computing
security
Logic gates
IP networks
internet
Cloud Computing
Protocols
composability
Internet of Things
Human Factors
Human behavior
Resiliency
pubcrawl
Metrics
IoT
biblio
Inhibiting Browser Fingerprinting and Tracking
Submitted by K_Hooper on Wed, 12/20/2017 - 10:33am
privacy
Web Tracking
Web sites
Web servers
Web pages
Web Browser Security
Web browser
user privacy
user computer
user browser experience
side-effects
Resiliency
pubcrawl
Browser Fingerprinting
online front-ends
Metrics
internet
Human behavior
Fingerprint recognition
Fingerprinting Countermeasure
fingerprint identification
data privacy
browser tracking
Browsers
browser fingerprinting identification
biblio
Efficient Method for Analyzing Malicious Websites by Using Multi-Environment Analysis System
Submitted by K_Hooper on Wed, 12/20/2017 - 10:33am
multienvironment analysis system
Web sites
Web client environments
Web Browser Security
Uniform resource locators
system monitoring
security of data
Resiliency
Relays
pubcrawl
obfuscation code decoding
obfuscated javascript
multimodal analysis
Browsers
multi-environment analysis
Metrics
malware
malicious Web sites
internet
Human behavior
Electronic mail
dynamic analysis
drive-by download attack
Decoding
Data mining
data analysis
« first
‹ previous
…
72
73
74
75
76
77
78
79
80
…
next ›
last »