Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Vulnerability
biblio
Synthesizing perception based on analysis of cyber attack environments
Submitted by BrandonB on Tue, 05/05/2015 - 12:40pm
Equations
Vulnerability
vulnerabilities types
toxicity metrics
social aspects of automation
perception synthesis
offensive activities
Measurement
India CTF
InCTF characteristics
Hacking
hackers
Games
framework
adversory behavior
defensive activities
Cyber situational awreness
cyber situational awareness
cyber intensive games
cyber attack intensity
cyber attack environments
cyber attack aggression
Computer hacking
computer games
Computer crime
assets protection
analytic hierarchy process
biblio
Constructing secure web applications with proper data validations
Submitted by BrandonB on Tue, 05/05/2015 - 10:53am
Computational modeling
computer network security
critical web application vulnerabilities
Cross Site Scripting
data validations
HTML
injection
injections
internet
secure Web applications
security
validation
Vulnerability
XML
XSS
biblio
Current issues and challenges on cyber security for industrial automation and control systems
Submitted by BrandonB on Tue, 05/05/2015 - 9:35am
control systems
Cyber incident
cyber security
cyber threat
IACS
IEC standards
industrial automation and control systems
industrial control
malware
production engineering computing
Protocols
security
security of data
Vulnerability
biblio
Security configuration analytics using video games
Submitted by BrandonB on Mon, 05/04/2015 - 2:26pm
security of data
NetMaze
network configuration verification problem
network topology
provable mapping
provable verification
security
Security analysis
security configuration analytics
security configuration settings
Human Factors
security property
simulation tool
special languages
specification languages
system robustness
Topology
user interfaces
video games
Vulnerability
crowdsourcing
attack analysis
attack attribution
Communication networks
Computational modeling
computer games
computing systems
Conferences
configuration conflict
courseware
3D game object
educational software
formal methods
formal verification
game educational value
game interface
gameplay scenario
Games
human factor
biblio
Modelling Analysis and Auto-detection of Cryptographic Misuse in Android Applications
Submitted by BrandonB on Mon, 05/04/2015 - 1:30pm
cryptographic misuse vulnerability model
Vulnerability
static analysis
Runtime
prototype tool crypto misuse analyser
program diagnostics
Modelling Analysis
Humanoid robots
encryption
Cryptography
Analytical models
cryptographic misuse autodetection
Cryptographic Misuse
cryptographic API
CMA
application program interfaces
Androids
Android application
Android (operating system)
android
biblio
Analysis on Password Protection in Android Applications
Submitted by BrandonB on Mon, 05/04/2015 - 1:26pm
leakage
vulnerability analyzing method
Vulnerability
user privacy
taint analysis
smart phones
PW Exam
privacy
password protection
password leakage
password
mobile computing
Android applications
Humanoid robots
encryption
decompile step
data privacy
cryptography misuse detection
cryptography misuse analysis
Cryptography
API call record
Androids
Android apps
biblio
Analysis on vulnerability of power grid based on electrical betweenness with information entropy
Submitted by BrandonB on Fri, 05/01/2015 - 7:26am
complex networks
Entropy
Generators
IEEE 118 bus system
IEEE standards
information entropy
Load modeling
power grid vulnerability
power grids
Vulnerability
biblio
Power grids vulnerability analysis based on combination of degree and betweenness
Submitted by BrandonB on Fri, 05/01/2015 - 7:24am
betweenness index
complex networks
degree index
Degree-betweenness
Educational institutions
fault simulation
Generators
IEEE 118 bus system
Indexes
power grid vulnerability analysis
power grids
power system faults
Power system protection
Vulnerability
biblio
Cloud Computing Vulnerability: DDoS As Its Main Security Threat, and Analysis of IDS As a Solution Model
Submitted by BrandonB on Thu, 04/30/2015 - 1:14pm
cloud
DDoS
IDS
security
Vulnerability
« first
‹ previous
…
3
4
5
6
7
8
9
10
11