Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
HTTP security headers analysis of top one million websites
Submitted by grigby1 on Fri, 11/20/2020 - 2:15pm
web security
security of data
Security Policies Analysis
server
set-cookie
strict- transport-security
tools
top one million websites survey
transport protocols
Uniform resource locators
security
web security policies
Web sites
websites
World Wide Web
www subdomain
X-content-type
X-frame-options
X-XSS-protection
X.509 Certificate
HTTP/2
Charge coupled devices
collaboration
content security policy
content-security-policy
Databases
HTTP headers
HTTP response headers analysis
HTTP security headers analysis
HTTP strict transport security
Alexa top one million list
HTTPs
HTTPS requests
hypermedia
internet
policy-based governance
Protocols
pubcrawl
redirections
referrer-policy
biblio
Assessing Level of Resilience Using Attack Graphs
Submitted by aekwall on Mon, 11/16/2020 - 2:51pm
attack graph
Resilient Security Architectures
Unity software
system resiliency
security property
Resiliency
resilience level assessment
program visualisation
possible attack instances
JKind model checker integrated tool
generated network models
generated attack sequences
generated attack scenarios
cyber-physical-systems
architecture analysis-&-design language
AADL
security of data
faults
attack graphs
stability
Local area networks
Stability analysis
program verification
resilience
Communication networks
cyber-attacks
Analytical models
tools
graph theory
pubcrawl
security
biblio
Implementing Cyber Resilient Designs through Graph Analytics Assisted Model Based Systems Engineering
Submitted by aekwall on Mon, 11/16/2020 - 2:51pm
cyber resilient designs
Resilient Security Architectures
Resiliency
structured system engineering methodology
resilience requirements
Model-based Systems Engineering
mitigate cyber risk
MBSE tools
MBSE
inter-element relationships
graph analytics
graph analytic methods
graph analytic assisted model
engineering cyber resilient systems
design lifecycle
decision analysis methods
security of data
complex models
centralized MBSE database
cyber resilience
resilience
systems engineering
Risk
computer security
risk management
Analytical models
Cybersecurity
tools
graph theory
pubcrawl
Big Data
biblio
Compliance Checking of Open Source EHR Applications for HIPAA and ONC Security and Privacy Requirements
Submitted by aekwall on Mon, 11/09/2020 - 1:20pm
OpenEMR
digital versions
EHR applications
Electronic Health Record applications
Health Information Technology certification criteria
Health Insurance Portability
HIPAA Compliance
HIPAA technical requirements
ONC certification
ONC criteria
open source EHR applications
convenient access
paper-based patient
patient medication
patient treatment plans
precise medical decision-making process
privacy criteria
Privacy Requirements
regulatory requirements
security risks
static code analysis-based vulnerability
Information Reuse and Security
static analysis
Servers
data privacy
electronic health records
Medical services
security
Resiliency
pubcrawl
privacy
tools
open source tools
security of data
security vulnerabilities
health care
security issues
Compositionality
certification
adopted EHR application
certification compliance
clinic visits
compliance checking
biblio
Utilizing Netflow Data to Detect Slow Read Attacks
Submitted by aekwall on Mon, 11/09/2020 - 1:14pm
machine learners
application layer DDoS attacks
application servers
classifiers
IP Flow Information Export standard
IPFIX
IPFIX standard
legitimate network requests
low volume attack methods
open systems
NetFlow
Netflow data
network security solutions
SiLK
Slow Read
slow read attack detection models
slow read DDoS attacks
Information Reuse and Security
pubcrawl
Computer crime
computer network security
false alarm rate
IP networks
Protocols
invasive software
learning (artificial intelligence)
Resiliency
distributed denial of service
internet
tools
computer networks
file servers
Web servers
Compositionality
malware
memory resources
biblio
ARP Poisoning Attack Detection Based on ARP Update State in Software-Defined Networks
Submitted by grigby1 on Wed, 11/04/2020 - 2:13pm
repetitive ARP reply
tools
Software-Defined Networks
software-defined networking
software defined networking
SFC vulnerability
SFC
service function chaining
Servers
security issues
SDN
Scalability
Safety
Resiliency
resilience
AI Poisoning
pubcrawl
Protocols
Next generation networking
networking technology
networking environment
IP networks
Human behavior
Firewalls (computing)
control systems
computer network security
ARP update state
ARP Poisoning attack detection
ARP Poisoning
biblio
Gathering Insights from Teenagers’ Hacking Experience with Authentic Cybersecurity Tools
Submitted by grigby1 on Wed, 11/04/2020 - 2:01pm
Games
tools
serious games (computing)
science-popularizing program
realistic virtual network infrastructure
pubcrawl
program testing
professional game
privacy
Penetration Testing
Hacking
active learning
further education
education
cybersecurity tools
cybersecurity game
cybersecurity education
cyber physical systems
Conferences
Computer crime
computer aided instruction
authentic cybersecurity
biblio
Concept Inventories in Cybersecurity Education: An Example from Secure Programming
Submitted by grigby1 on Wed, 11/04/2020 - 2:01pm
Force
tools
testing
security of data
secure programming concept inventory
secure programming
pubcrawl
Programming profession
programming
privacy
computer science education
education
Delphi study
Cybersecurity Education Curriculum 2017 guidelines
cybersecurity education
Cybersecurity
cyber physical systems
concept inventory
computer security
biblio
Cybersecurity Education: From Beginners to Advanced Players in Cybersecurity Competitions
Submitted by grigby1 on Wed, 11/04/2020 - 1:43pm
security of data
learning needs
motivation
National Cyber League competition
novice players
player feedback
player interests
privacy
pubcrawl
Interviews
student engagement
systematic training
Systematics
Task Analysis
team game
tools
Training
undergraduate students
cybersecurity competition
advanced players
capture-the-flag type tasks
college-level cybersecurity competition
computer aided instruction
computer science education
computer security
confidence level
cyber physical systems
active learning
cybersecurity concepts
cybersecurity education
Educational institutions
Games
Human Factors
human-subject study
individual games
biblio
Ontology-based Dynamic and Context-aware Security Assessment Automation for Critical Applications
Submitted by aekwall on Mon, 11/02/2020 - 2:46pm
ontology-based security model
Virtualization
virtualisation
ubiquitous computing
tools
testing
standards
security testing
security of data
Security Metrics
security assessment architecture
security aptitude
quantifiable security assessment process
pubcrawl
application configurations
ontology-based dynamic security assessment automation
Ontology
ontologies (artificial intelligence)
Ontologies
Metrics
metrics testing
Measurement
Dynamic Application Security Testing
critical infrastructure
context-aware security assessment automation
Business
automation
application security
« first
‹ previous
…
29
30
31
32
33
34
35
36
37
…
next ›
last »