Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer science
biblio
A Model-Based Time-to-Compromise Estimator to Assess the Security Posture of Vulnerable Networks
Submitted by grigby1 on Wed, 10/23/2019 - 12:36pm
patch management
uncertainty
Security Risk Management
Security Risk Estimation
security
Scalability
risk management
risk assessment
Resiliency
resilience
pubcrawl
Security Metrics
NIST
Monte Carlo simulation
Metrics
Measurement
Human Factors
Human behavior
estimation
computer science
Comparative security metric
biblio
The $\beta$-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation
Submitted by grigby1 on Wed, 10/23/2019 - 12:36pm
Risk-Metric
national CERT
original TTC
practical cyber security risk estimation
pubcrawl
resilience
Resiliency
risk management
Risk-Estimation
Metrics
Scalability
security of data
Security Risk Estimation
Security-Metric
Threat Landscape
time-to-compromise metric
vulnerability database
β-distribution
estimation
complex systems
Complexity theory
computer science
continuous attacker skill
CVSS vectors
cyber threat intelligence
Cyber-security
cybersecurity metrics
complex system modeling
Human behavior
Human Factors
individual systems
IT-security
Large-scale systems
mathematical shortcomings
Measurement
methodological shortcomings
biblio
Automatic stabilization of Zigbee network
Submitted by aekwall on Mon, 08/05/2019 - 10:37am
Resiliency
ZigBee sub-device
ZigBee signal strength
ZigBee relay
Zigbee network
ZigBee gateway
ZigBee coordinator
Zigbee
Wireless fidelity
Wireless communication
stable ZigBee transmission
Smart homes
Smart Home
automatic stabilization
pubcrawl
power consumption
original ZigBee node
low power consumption
Logic gates
IoT
internetworking
intelligent system
information technology
expandability
computer science
composability
biblio
CVSS Metric-Based Analysis, Classification and Assessment of Computer Network Threats and Vulnerabilities
Submitted by aekwall on Mon, 07/01/2019 - 10:12am
CVSS-metric
vulnerability Similarity Measure
vulnerabilities
VSM
VACC
threats
Security Metrics
pubcrawl
Protocols
probability
network security tools
Network
Monitoring
Metrics
Measurement
analysis
CVSS metric-based VACC
CVSS metric-based dynamic vulnerability analysis classification countermeasure criterion
computer-based networks
computer security
computer science
computer networks
computer network threats
computer network security vulnerabilities
computer network security
common vulnerability scoring system metric-based technique
CNSVT
classification
Assessment
biblio
The β-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation
Submitted by aekwall on Mon, 07/01/2019 - 10:12am
methodological shortcomings
β-distribution
vulnerability database
time-to-compromise metric
Threat Landscape
Security-Metric
security of data
Security Metrics
Risk-Metric
Risk-Estimation
risk management
pubcrawl
practical cyber security risk estimation
original TTC
national CERT
Metrics
complex system modeling
Measurement
mathematical shortcomings
Large-scale systems
IT-security
individual systems
estimation
cybersecurity metrics
Cyber-security
cyber threat intelligence
CVSS vectors
continuous attacker skill
computer science
Complexity theory
complex systems
biblio
Concept of Smart Building Cyber-physical Systems Including Tamper Resistant Endpoints
Submitted by aekwall on Mon, 03/11/2019 - 10:37am
oAuth2.0
verification mechanism
update mechanisms
Trusted Platfrom Modules
trusted platform modules
Trusted Platform Module
Trusted Computing
TLS 1.3
tamper resistant endpoints
Software
smart buildings
smart building cyber-physical systems
security of data
secure communication channels
Resiliency
pubcrawl
composability
IT-security
IoT
Internet of Things
integrity measurement mechanisms
hardware-based security
Hardware
firmware
data integrity
cyber-physical systems
Cryptography
critical infrastructures
critical infrastructure
CPS devices
Containers
computer science
biblio
Authorship Attribution vs. Adversarial Authorship from a LIWC and Sentiment Analysis Perspective
Submitted by grigby1 on Fri, 02/22/2019 - 4:02pm
Metrics
Writing
stylometry
Steady-State Genetic Algorithm
Steady-state
sentiment analysis
Semantics
pubcrawl
psychology
Adversarial Authorship
LIWC
Human behavior
GEFeS
Feature Selection
feature extraction
computer science
authorship attribution
biblio
Graph Sketching against Adaptive Adversaries Applied to the Minimum Degree Algorithm
Submitted by grigby1 on Mon, 01/21/2019 - 12:38pm
pubcrawl
matrix elimination orderings
Metrics
minimum degree algorithm
minimum fill degree
nearly-linear time algorithm
oblivious adversary model
polylogarithmic time
provable approximation
Human behavior
query processing
randomised algorithms
randomized data structure
Resiliency
Scalability
sketching data structure
Sparse matrices
combinatorial scientific computing
adaptive adversarial model
adaptive adversaries applied
Adversary Models
approximate fill degrees
approximate greedy minimum degree orderings
Approximation algorithms
approximation theory
combinatorial mathematics
Adaptation models
computational complexity
computer science
Data models
data structures
graph sketching
graph theory
Heuristic algorithms
biblio
Edge Caching for Enriched Notifications Delivery in Big Active Data
Submitted by grigby1 on Wed, 01/16/2019 - 2:37pm
caching policies
TTL caching
TTL based caching
Publish-subscribe
pattern clustering
notifications delivery
notification delivery
eviction-based caching
end users
edge caching
distributed broker nodes
declarative subscriptions
data management paradigm
data items
computer science
caching strategies
Big Data
bigdata publish-subscribe system
big active data systems
Big active data
BAD system
backend data cluster
Web Caching
cache storage
Distributed databases
Electronic mail
Task Analysis
Scalability
Resiliency
Metrics
pubcrawl
biblio
A Google Chromium Browser Extension for Detecting XSS Attack in HTML5 Based Websites
Submitted by grigby1 on Wed, 01/16/2019 - 2:32pm
Human behavior
XSS attack
Web sites
Web pages
Web Browser Security
tools
tags
security of data
Resiliency
pubcrawl
online front-ends
Metrics
input validation
hypermedia markup languages
Attack vectors
HTML5 based Web sites
Google Chromium browser extension
extensions
Electronic mail
cross-site scripting attack
cross-site scripting
cross document messaging
computer science
Compositionality
Browsers
Browser Security
Attributes
attribute abuse
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »