Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Secure Composition of PKIs with Public Key Protocols
Submitted by K_Hooper on Wed, 02/28/2018 - 11:32am
Public key
tools
telecommunication security
tagging
symbolic model
symbolic formal models
secure composition
public key protocols
public key infrastructures
public key cryptography
Composition
pubcrawl
Protocols
PKI
formal method
encryption
Cryptographic Protocols
Computational modeling
Compositionality
biblio
Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL
Submitted by K_Hooper on Wed, 02/28/2018 - 11:31am
Reactive power
verification tool
transport protocols
tools
Theorem Proving
standards
standard Transport Layer Security handshake
security protocols
security of data
security
Resistance
relative soundness result
algebra
pubcrawl
Protocols
proof assistants
proof argument
pen-and-paper proof
Isabelle/HOL
Isabelle-HOL security
formal verification
constraint-based approach
Compositionality
biblio
Hybrid Model of Rule Based and Clustering Analysis for Big Data Security
Submitted by grigby1 on Tue, 02/27/2018 - 2:40pm
Analytical models
Anomaly Detection
Big Data
Communication networks
composability
Data models
machine learning
privacy
pubcrawl
resilience
Resiliency
security
Security analysis
Sparks
tools
biblio
A Hybrid Approach to Improving Program Security
Submitted by grigby1 on Tue, 02/27/2018 - 2:40pm
machine learning
tools
Text Mining
testing
static analysis
Resiliency
resilience
pubcrawl
privacy
Time Frequency Analysis
hybrid
Frequency measurement
Data models
Cybersecurity
composability
code analysis
Security application security
biblio
Named data networking testbed for scientific data
Submitted by grigby1 on Wed, 02/21/2018 - 1:48pm
Policy-Governed Secure Collaboration
metadata
Meteorology
Metrics
name based symmetrical forwarding
named data networking
NDN-based climate data delivery
Pipelines
policy governance
large-scale scientific data
pubcrawl
resilience
Resiliency
scientific data named data
scientific information systems
Throughput
tools
human factor
climate science
climatology
collaboration
Containers
data handling
data intensive science
data-intensive science experiments
Human behavior
clean slate
Human Factors
information centric networking
information retrieval
intelligent data retrieval
intercontinental NDN testbed
intercontinental network
internet
biblio
Formal Verification of Protocols Based on Short Authenticated Strings
Submitted by grigby1 on Thu, 02/15/2018 - 11:49am
ISO-IEC 9798-6:2010 standard
tools
standards
short authenticated strings
security protocols
security
Resiliency
resilience
pubcrawl
Protocols
multifactor authentication protocol
multifactor authentication
Metrics
Mathematical model
AKISS tool
ISO standards
IEC standards
Human Factors
human factor
Human behavior
formal verification
Force
decision procedure
data privacy
Cryptographic Protocols
Calculus
brute force attacks
biblio
A theoretical review of social media usage by cyber-criminals
Submitted by grigby1 on Thu, 02/15/2018 - 11:44am
online social networking sites
tools
threats
stalking
spam
social networking (online)
social media usage
social media
Social Engineering Attacks
Scalability
Resiliency
resilience
pubcrawl
Phishing
click-jacking prevention
malware
invasive software
identity theft
Human Factors
human factor
Human behavior
Facebook
Electronic mail
cybercriminal
cyber-criminals
Cross Site Scripting (XSS)
Cross Site Scripting
Computer crime
biblio
Cyber Terrain Mission Mapping: Tools and Methodologies
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
military computing
tools
situational awareness
sensors
security of data
Resiliency
pubcrawl
Organizations
mission-centric cybersecurity
mission relevant cyber terrain
mission execution
Mission Assurance
composability
Metrics
key terrain cyber
Cyberspace
cyber terrain mission mapping
cyber situational awareness
cyber mission mapping
cyber dependency impact analysis
Cyber Dependencies
cyber assets
computer security
Computational modeling
biblio
Substation Monitoring to Enhance Situational Awareness \#x2014; Challenges and Opportunities
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
power system reliability
tools
system operator
suitable attack response
Substations
substation monitoring
sophisticated cyber attacks
Software
situational awareness
security of data
Resiliency
Reliability
recovery functions
pubcrawl
Protocols
power system security
composability
power grids
Power Grid
power engineering computing
Monitoring tools
monitoring substations
Monitoring
Metrics
malicious cyber activity
grid reliability
grid operators
grid operation
expert systems
energy management
cyber security
biblio
Leverage Intrusion Detection System Framework for Cyber Situational Awareness System
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
Metrics
tools
threat
situational awareness
security
Resiliency
pubcrawl
Ports (Computers)
Organizations
Network
attack
Measurement
intrusion detection system
GUI
framework
Decision Making
Cyberspace
cyber situational awareness system
composability
« first
‹ previous
…
53
54
55
56
57
58
59
60
61
next ›
last »