Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Moving target defense for adaptive adversaries
Submitted by Heather Lucas on Wed, 09/17/2014 - 5:33pm
moving target defense
Unsolicited electronic mail
Training
Switches
standard static methods
security problems
security of data
security applications
security
reverse-engineer
reverse engineering
performance evaluation
adaptive adversaries
ML algorithms
malicious activities
machine learning
learning (artificial intelligence)
innocent activities
hybrid dynamical systems
Games
flexible MT defense strategy
cyber security
Biological system modeling
algorithm performance degradation
biblio
Modeling and Sensing Risky User Behavior on Mobile Devices
Submitted by enck on Wed, 09/17/2014 - 5:32pm
Wireless Sensing and Actuation
Science of Security
CPS Technologies
Foundations
ACM CCS
CPS Technologies
cyber security
foundations
Human and Societal Aspects of Security and Privacy
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
mobile
Mobile and Wireless Security
network security
Science of Security
security
User behavior
wireless sensing and actuation
ACM CCS
Cyber Security
Intrusion Detection Systems
Mobile and Wireless Security
Human and Societal Aspects of Security and Privacy
Intrusion/Anomaly Detection and Malware Mitigation
Network Security
biblio
Securing Hadoop in Cloud
Submitted by vouk on Wed, 09/17/2014 - 5:32pm
Control
Science of Security
Foundations
ACM CCS
cloud
control
Cryptography
cyber security
foundations
Hadoop
key management
lack of fine-grained access control
Operating systems security
overloaded authentication key
Science of Security
security
Systems Security
Virtualization and Security
ACM CCS
Cryptography
Cyber Security
Key Management
Virtualization and Security
Operating Systems Security
Systems Security
biblio
Human Factors in Webserver Log File Analysis: A Controlled Experiment on Investigating Malicious Activity
Submitted by llayman on Wed, 09/17/2014 - 5:30pm
Quantitative Verification
Science of Security
Validation and Verification
Foundations
ACM CCS
foundations
Human and Societal Aspects of Security and Privacy
Human Factors
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
log files
Quantitative Verification
Science of Security
security
Social Aspects of Security and Privacy
validation and verification
ACM CCS
Intrusion Detection Systems
Social Aspects of Security and Privacy
Human and Societal Aspects of Security and Privacy
Intrusion/Anomaly Detection and Malware Mitigation
biblio
Less is More?: Investigating the Role of Examples in Security Studies Using Analogical Transfer
Submitted by arao on Wed, 09/17/2014 - 5:30pm
Systems Engineering
ACM CCS
Analogical Transfer
CPS Technologies
cyber security
foundations
Human and Societal Aspects of Security and Privacy
Human Factors
psychology
Science of Security
security
Social Aspects of Security and Privacy
systems engineering
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
ACM CCS
Cyber Security
Social Aspects of Security and Privacy
Human and Societal Aspects of Security and Privacy
biblio
A Lattice Model of Secure Information Flow
Submitted by Heather Lucas on Wed, 09/17/2014 - 5:27pm
Information Flow
lattice
program certification
protection
security
security class
profile
Aditya Deshpande
Vetronics
Survivability
resilience
Safety
security
certification
file
Proving Abstractions of Dynamical Systems Using Numerical Simulations
Submitted by mitras on Tue, 06/03/2014 - 4:35pm. Contributor:
Sayan Mitra
Simulation
abstraction
security
HotSoS 2014
Academia
Presentations
Presentation Slides
file
Let's Play Poker: Effort and Software Security Risk Estimation in Software Engineering
Submitted by Laurie Williams on Tue, 06/03/2014 - 3:16pm. Contributor:
Laurie Williams
agile
security
HotSoS 2014
Academia
Presentations
Presentation Slides
file
Alloy-based Game-theoretic Framework for Analyzing Security Issues in Small-scale Smart Grid Systems
Submitted by jianye on Wed, 05/28/2014 - 11:40pm. Contributor:
Jianye Hao
CPS Domains
Smart Grid
Energy
CPS Technologies
Foundations
cyber-physical systems
game theory
security
small scale systems
MIT
2014 National Workshop on Research Frontiers in Medical CPS
2014
Academia
Presentation
5-Minute Presentations
5-Minute Presentations
« first
‹ previous
…
436
437
438
439
440
441
442
443
444
…
next ›
last »