Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
protection
biblio
Power System Monitoring, Control and protection using IoT and cyber security
Submitted by grigby1 on Fri, 09/08/2023 - 4:17pm
Compositionality
IOTA
communication
technology
power system
protection
Internet-scale Computing Security
Data protection
cyber security
Roads
Telecommunications
Internet of Things
Network
power grids
Power Grid
security
control systems
composability
Production
Scalability
Safety
Resiliency
resilience
collaboration
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
Monitoring
biblio
Calculation of Risk Parameters of Threats for Protected Information System
Submitted by grigby1 on Mon, 04/18/2022 - 10:56am
probability
threat
Task Analysis
Security Risk Estimation
security
Scalability
Risk
resilience
pubcrawl
protection
automation
Metrics
Mathematical model
intensity
Human Factors
flow
estimation
end-to-end security systems
Economics
biblio
Wireless Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 4:40pm
message protection
fading channels
information-theoretic security
information theoretic security
average secure communication
channel state information
Fading
imperfect channel state information
Information analysis
low-density parity-check (LDPC) codes
secure communication protocol
multilevel coding
optimized low-density parity-check codes
outage probability
Privacy Amplification
quasi static fading channel
secrecy capacity
secret key agreement
Wireless application protocol
Wireless Information-Theoretic Security
Metrics
data privacy
private key cryptography
telecommunication security
Resiliency
Human behavior
pubcrawl
policy-based governance
privacy
Communication system security
Scalability
probability
channel coding
parity check codes
Data Security
information security
wireless channels
protection
wireless channel
secret key generation
biblio
Cookies in a Cross-site scripting: Type, Utilization, Detection, Protection and Remediation
Submitted by grigby1 on Wed, 02/10/2021 - 1:20pm
Browsers
Cross Site Scripting
XSS
spyware
protection
mitigation
cookies
Cisco 2018
artificial intelligence techniques
cross-site scripting
classification
web applications
Cryptography
Artificial Intelligence
security vulnerabilities
Data protection
internet
Scalability
Resiliency
resilience
Human behavior
pubcrawl
security of data
encryption
biblio
Privacy Preserving Big Data Publication On Cloud Using Mondrian Anonymization Techniques and Deep Neural Networks
Submitted by aekwall on Mon, 07/13/2020 - 11:07am
privacy
k-anonymity
machine learning
Mondrian anonymization techniques
Mondrian based k-anonymity approach
neural nets
Neural networks
personal data
personally identifiable information
predominant factor
high-dimensional data deep neural network based framework
privacy breach
privacy preservation
privacy preserving big data publication
privacy-preservation
protection
Resiliency
security
user privacy in the cloud
data analysis
pubcrawl
Human Factors
resilience
Scalability
Metrics
Big Data
Big Data Analytics
Cloud Computing
compromising privacy
big data privacy
data management
Data models
data privacy
data utility
Databases
deep neural networks
differential privacy
DNN
biblio
Scalable DDoS Mitigation System
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
detection
DDoS attack mitigation
protection
multitarget DDoS attacks
modular filtering system
filtration
DDoS mitigation system
DDoS attacks filtering
data center
data centers
tools
internet
Metrics
Computer crime
composability
pubcrawl
Human behavior
Resiliency
Hardware
Servers
IP networks
distributed denial of service attacks
Monitoring
DDoS
computer network security
biblio
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Submitted by aekwall on Mon, 01/20/2020 - 12:05pm
network reachability
attack tree
client-side attack
enterprise networks risk measurement
host based vulnerability scan
intrusion prevention system
modeling modern network attack
NetSPA attack graph system
network defense
attack graph
personal firewall
point-to-point reachability algorithm
protection
proxy firewall
reverse reachability computation
SCAP
zero-day exploit
Zero Day Attacks and Defense
risk management
authorisation
Resiliency
pubcrawl
composability
graph theory
Computational modeling
reachability analysis
Analytical models
computer network security
computer security
military computing
Laboratories
computer networks
Predictive Metrics
Computer worms
Application software
biblio
Secured Outsourcing towards a Cloud Computing Environment Based on DNA Cryptography
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
intensive data computing
trust
storage
security solution
security schema
security
secured outsourcing
Resiliency
resilience
pubcrawl
protection
private data
privacy
outsourcing
Metrics
Internet service
Cloud Computing
integrity
Human behavior
encryption
encoding
DNA cryptography
DNA
data center
Cryptography
confidentiality
completely secure migration
cloud service providers
cloud provider
cloud computing technology
cloud computing paradigm
biblio
The Use of Expert Judgement as the Method to Obtain Delay Time Values of Passive Barriers in the Context of the Physical Protection System
Submitted by grigby1 on Thu, 01/02/2020 - 2:46pm
passive barrier elements
tools
testing
socio-economic effects
socio-economic development
security
Scalability
Resiliency
resilience
Reliability
pubcrawl
protection
physical protection system
passive barriers
data analysis
method
Mechanical factors
mechanical barriers
Human behavior
fuzzy set theory
expert systems
expert judgement
expert
delays
delay time values
delay time
Decision Making
Databases
biblio
Unauthorized Access Point Detection Using Machine Learning Algorithms for Information Protection
Submitted by grigby1 on Fri, 03/15/2019 - 11:53am
pubcrawl
wireless LAN
wireless Internet environment
wireless integrated environment
Wireless fidelity
Wireless communication
wireless AP security
Wi-Fi
unauthorized AP
unauthorized Access Point detection
threat vectors
Support vector machines
support vector machine
security
RTT value data
Classification algorithms
protection
privacy
Prediction algorithms
multilayer perceptrons
military facilities
Metrics
machine learning algorithms
machine learning
learning (artificial intelligence)
information protection
hacking attacks
detection
computer network security
1
2
3
next ›
last »