Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
virtual environment
biblio
IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware
Submitted by grigby1 on Mon, 03/15/2021 - 1:11pm
IoTC-MAL
vulnerabilities
virtualisation
virtual environment
video surveillance
Servers
Resiliency
resilience
pubcrawl
network-connected devices
Metrics
malware
malicious samples
low-interactive IoT honeypots
IoTCMal
authentication
IoT device
IoT
invasive software
Internet of Things
hybrid IoT honeypot
honeypot
homology analysis
Computer hacking
composability
command injection attacks
Bridges
authorisation
authentication services
biblio
Automated Vulnerability Testing via Executable Attack Graphs
Submitted by aekwall on Mon, 01/25/2021 - 1:04pm
automated vulnerability testing
vulnerability scans
vulnerability assessments
virtual environment
suboptimal decision making
individual attack paths
executable attack graphs
end-to-end process
cyber risk reduction
cyber risk assessments
cyber risk assessment uncertainty
cyber risk assessment process
cyber attack graphs
AVRA
computer network security
automated vulnerability and risk analysis
automatic test software
attack graphs
Predictive Metrics
security issues
risk analysis
Decision Making
reachability analysis
graph theory
composability
pubcrawl
Resiliency
biblio
Analyzing Overhead from Security and Administrative Functions in Virtual Environment
Submitted by grigby1 on Tue, 11/17/2020 - 2:41pm
para-virtualization technique
virtual environment
virtual environments
administrative component performance recommendations
Availability
guest operating systems
guest VMs
hypervisor workload
overhead analysis
operating systems
Redundancy
response time
System Availability
virtual platforms
virtualized environment
Xen-hypervisor
Operating systems security
Virtual machining
security
Servers
pubcrawl
Metrics
Resiliency
composability
system monitoring
virtualisation
security of data
Virtual machine monitors
virtual machines
load balancing
resource allocation
Bandwidth
resilience
operating systems (computers)
biblio
Towards natural interaction in immersive reality with a cyber-glove
Submitted by grigby1 on Thu, 06/04/2020 - 11:48am
Task Analysis
mixed reality interaction tasks
mixed reality systems
natural interaction
privacy
pubcrawl
resilience
Resiliency
sensors
standard VR hand controller devices
immersive systems
Three-dimensional displays
tracking
user interfaces
virtual door
virtual environment
virtual reality
virtual reality interaction tasks
virtual reality systems
wrist
gesture recognition
augmented reality
biomechanics
composability
cyber physical systems
cyber-glove based interactions
cyber-glove system
data gloves
embodiment
finger movements
3D manipulation task
glove-based systems
hand orientation
Heart rate
high immersive experiences
HTC Vive controller
human computer interaction
Human Factors
immersive reality
immersive sensation
biblio
Securing Virtual Machines on Cloud through Game Theory Approach
Submitted by grigby1 on Mon, 03/09/2020 - 1:25pm
resource allocation
VMVM
virtualisation
Virtual machining
virtual machines
virtual machine vitality measure
virtual machine security
Virtual machine monitors
virtual environments
virtual environment
utility function
tower defence game
security
Cloud Computing
pubcrawl
Poles and towers
operating systems (computers)
hypervisor
Hardware
Games
game theory approach
game theory
game strategy block
computer games
cloud server failure
biblio
Prevention of Ransomware Execution in Enterprise Environment on Windows OS: Assessment of Application Whitelisting Solutions
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
unauthorized applications
Organizations
pubcrawl
Ransomware
ransomware execution prevention
Resiliency
SecureAPlus
Signature based
Trusted Computing
Microsoft Windows (operating systems)
virtual environment
VoodooShield
whitelisting
Windows edition
Windows Operating System Security
Windows OS
Windows Server edition
zero-day antimalware solution
composability
application control solutions
application whitelisting software
Application Whitelisting Solutions
AppLocker
authorisation
blacklisting
business data processing
CodeShield
administrative privileges
Cryptography
data breach prevention
Databases
enterprise environment
invasive software
malicious files
malware
Metrics