Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Security Evaluation
biblio
Security Evaluation of a VM-Based Intrusion-Tolerant System with Pull-Type Patch Management
Submitted by aekwall on Mon, 02/10/2020 - 11:10am
Software
Scalability
security breaches
Security Evaluation
security of data
security patch
security patch management
security threats
Servers
push-type patch management
software assurance
software vulnerabilities
stochastic reward net
system security
virtual machine
virtual machine based intrusion tolerant system
virtual machines
VM-based intrusion-tolerant system
intrusion tolerance
attack behavior
composability
composite stochastic reward net model
Computational modeling
computer security
computer systems
defense behaviors
interval availability
Resiliency
malicious attack
Markov processes
Markov regenerative process
periodic vulnerability checking strategy
phase expansion
point-wise availability
pubcrawl
pull-type patch management
biblio
MeetCI: A Computational Intelligence Software Design Automation Framework
Submitted by grigby1 on Mon, 12/09/2019 - 1:01pm
MeetCI
XML file
XML
tools
specific supported functionality
software implementation process
software engineering
Software design automation
Software algorithms
Software
Security Evaluation
Recurrent neural networks
recurrent neural nets
public domain software
pubcrawl
open source software framework
application design decisions
machine learning domains
machine learning
Libraries
learning (artificial intelligence)
language compatibility
expert systems
expert system
Cryptography
computational intelligence techniques
computational intelligence software design automation framework
computational intelligence libraries
computational intelligence
Compositionality
composability
CI users
biblio
An Evaluation of the Security of the Bitcoin Peer-To-Peer Network
Submitted by grigby1 on Tue, 11/26/2019 - 2:38pm
Human Factors
transaction confirmation process
Software
service attacks
Security Evaluation
Scalability
Resiliency
resilience
pubcrawl
Protocols
Peer-to-peer computing
peer to peer security
P2P network
network protocol
network message exchanges
Metrics
bitcoin
human factor
Human behavior
distributed denial of service attacks
denial of service
DDoS Attacks
Data mining
Cryptographic Protocols
cryptocurrencies
computer network security
Computer crime
blockchain
Bitcoin peer-to-peer network
bitcoin mining process
bitcoin message exchanges
bitcoin core software
biblio
A Proposed Security Evaluator for Cryptosystem Based on Information Theory and Triangular Game
Submitted by grigby1 on Mon, 05/20/2019 - 3:29pm
information theoretic security
triangular game
security evaluator
Security Evaluation
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Metrics
Mathematical model
information theory
Ciphers
Human Factors
Human behavior
Games
game theory
Entropy
cryptosystem security
cryptosystem
Cryptography
composability
collaboration
biblio
Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks
Submitted by aekwall on Wed, 02/13/2019 - 11:01am
Security Risk Management
Attack Graph Construction
Attack vectors
Human behavior
network hardening
probabilistic model
pubcrawl
Resiliency
Scalability
Security Evaluation
vehicle security
vulnerability assessment
biblio
A Framework for Measurability of Security
Submitted by grigby1 on Wed, 11/14/2018 - 12:21pm
security attribute
Multi-Metrics
privacy
privacy and dependability evaluation complexity
pubcrawl
resilience
Resiliency
Scalability
security
multi metrics
security enhancement
Security Evaluation
security function
security measurability
security metric
SPD evaluation complexity
system analysis and design
Communication Systems
MM framework
Measurement
Internet of Things
internet
Human behavior
experts knowledge systematic storage
expert systems
expert knowledge retrieval
ES
Engines
embedded systems
Embedded System
Databases
data privacy
computer network security
biblio
Cryptosystem Security Evaluation Based on Diagonal Game and Information Theory
Submitted by grigby1 on Fri, 10/26/2018 - 4:04pm
Games
wireless communications networks
telecommunication security
Security Evaluation
Scalability
Random variables
pubcrawl
Metrics
information theory
Human Factors
Ciphers
game theory
game theoretic security
Entropy
diagonal Game
cryptosystem security evaluation
Cryptography
cognitive radio networks
cognitive radio
biblio
How formal analysis and verification add security to blockchain-based systems
Submitted by grigby1 on Thu, 08/23/2018 - 10:37am
ISO standards
tools
security of data
security layers
Security Evaluation
Scalability
Resiliency
resilience
pubcrawl
Protocols
process transactions
blockchain
integrated technology
IEC standards
formal verification
formal method
formal analysis
domain specific language
Cryptography
contracts
blockchain-based system security
blockchain security
biblio
Poisoning Behavioral Malware Clustering
Submitted by grigby1 on Fri, 07/06/2018 - 1:06pm
pubcrawl
Human behavior
Unsupervised Learning
clustering
Scalability
computer security
malware detection
resilience
Security Evaluation
Resiliency
Adversarial Machine Learning
AI Poisoning
biblio
Research of Security Risk in Electric Power Information Network
Submitted by grigby1 on Wed, 05/30/2018 - 3:01pm
power engineering computing
synthesis evaluation model
styling
security weaknesses
security risk
security of data
Security Evaluation
risk management
risk assess
Resiliency
resilience
pubcrawl
Production
power systems
power system management
collaboration
policy-based governance
password
operating systems
network security
multilevel fuzzy comprehensive judgment
Metrics
Human Factors
Human behavior
fuzzy set theory
fuzzy judgment
evaluation index system
electric power information network
Communication networks
« first
‹ previous
1
2
3
next ›
last »