Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
In Sensors We Trust – A Realistic Possibility?
Submitted by BrandonB on Tue, 05/05/2015 - 10:43am
Data mining
computer architecture
Buildings
architecture
information dissemination
information management
information sharing
processing architecture
secure systems
security
sensing infrastructure
sensor information flow
sensors
biblio
Toward a Science of Secure Environments
Submitted by BrandonB on Tue, 05/05/2015 - 10:43am
environmental security
Systems Security
software security
security of data
security
secure environments
Science of Security
optimisation
network security
modeling
fundamental science
formal security
agile systems
detection mechanisms
Decision Making
cyber-decision-making
cyber security collaborative research alliance
cyber environment
continuous optimization problem
computer security
Computational modeling
Communities
Approximation methods
biblio
Open science, open security
Submitted by BrandonB on Tue, 05/05/2015 - 10:43am
Linux
security of data
security
production quality tools
Production
parallel processing
open security
open science
Materials
data representation
Intrusion Detection
HPC security
High performance computing
Filtering
data selection
Buildings
computer architecture
data analysis
biblio
Defensive maneuver cyber platform modeling with Stochastic Petri Nets
Submitted by BrandonB on Tue, 05/05/2015 - 10:19am
control systems
Cyberspace
deceptive defense strategies
defensive maneuver cyber platform modeling
information systems security
malicious attackers
military computing
moving target defense strategies
Petri nets
security
security of data
standards
stochastic petri nets
Stochastic processes
biblio
Morphing communications of Cyber-Physical Systems towards moving-target defense
Submitted by BrandonB on Tue, 05/05/2015 - 10:18am
morphing communications
traffic analysis attacks
Time factors
thwarting traffic analysis attacks
telecommunication traffic
Silicon
security
reliable communication services
real-time systems
networking infrastructures
network sessions
moving-target defense
Algorithm design and analysis
long-range communication services
internet
inter-packet delays
Information systems
eavesdrop network traffic
delays
cyber-physical systems
CPSMorph traffic morphing algorithm
CPS traffic
computer network reliability
biblio
Multiple OS rotational environment an implemented Moving Target Defense
Submitted by BrandonB on Tue, 05/05/2015 - 10:17am
moving target defense
testing
Servers
security of data
security
operating systems (computers)
operating systems
Nmap
multiple OS rotational environment
MTD technique
Availability
manual penetration test
IP networks
insert
Fingerprint recognition
defensive strategies
cyber-attacks mitigation
CORE Impact Pro
CORE
biblio
Scalable Security Models for Assessing Effectiveness of Moving Target Defenses
Submitted by BrandonB on Tue, 05/05/2015 - 10:16am
internet
security of data
Security Modeling Techniques
security assessment
Security analysis
security
scalable security models
networked system security
MTD
moving target defenses
moving target defense
Measurement
Linux
Analytical models
IMs
importance measures
hierarchical attack representation models
HARMs
graph theory
exhaustive search method
effectiveness assessment
Diversity methods
Computational modeling
Attack Representation Model
attack graphs
biblio
Scaling IPv6 address bindings in support of a moving target defense
Submitted by BrandonB on Tue, 05/05/2015 - 10:14am
moving target defense
UDP requests
UDP echo server
transport protocols
Time factors
statistical improbability
standards
sockets
Servers
security
reconnaissance phase
Peer-to-peer computing
peer to peer scenario
networking
network security research
MT6D
bound interfaces
malicious actor
Local area networks
Kernel
IPv6 moving target defense
IPv6 address space
IPv6 address bindings
IPv6
IP networks
internet
Ethernet interface
computer network security
client-server systems
client server ratio
client server networks
biblio
A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces
Submitted by BrandonB on Tue, 05/05/2015 - 10:13am
moving-target defense
VM migration-snapshotting
uncertainty
simulation
service attack surface
security of data
security
S-shaped generalized logistic function
risk modeling
replacement pool
Probes
probability
probabilistic MTD service deployment
Probabilistic logic
probabilistic algorithm
moving-target defense strategy
attack-surface heterogeneity-and-dynamics awareness
Mathematical model
Information systems
homogeneity problem
heterogeneous attack surfaces
Equations
dynamic probability
dynamic attack surfaces
diversity-compatibility
deep automation
configuration staticity
cloud-specific features
cloud-based service security
cloud infrastructures
Cloud Computing
attacker intelligence
biblio
National Cyber Range Overview
Submitted by BrandonB on Tue, 05/05/2015 - 10:01am
NCR
virtual machines
US Department of Defense
traffic emulation
testing
test
security
resource management
range
computer network security
National Cyber Range
malware
DoD communication networks
Department of Defense
cyberspace security threats
cyberspace resiliency testing
Cyberspace
« first
‹ previous
…
421
422
423
424
425
426
427
428
429
…
next ›
last »