Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
modeling
biblio
Evidence-based Trust Reasoning
Submitted by jingweihuang on Wed, 09/17/2014 - 6:31pm
Modeling
Science of Security
Foundations
ACM CCS
Evidence-based trust
foundations
modeling
Operating systems security
privacy
Science of Security
Systems Security
Trust Frameworks
trust model
Trusted Computing
Trusted platforms
ACM CCS
Trusted Computing
Trusted platforms
Trust Frameworks
Operating Systems Security
Systems Security
biblio
Cybersecurity Dynamics
Submitted by shouhuai on Wed, 09/17/2014 - 6:31pm
Modeling
Science of Security
Validation and Verification
Foundations
Cybersecurity dynamics
foundations
modeling
Science of Security
Security analysis
security model
validation and verification
ACM CCS
Cyber Security
biblio
Characterizing the Power of Moving Target Defense via Cyber Epidemic Dynamics
Submitted by shouhuai on Wed, 09/17/2014 - 6:31pm
Quantitative Verification
Systems Engineering
Modeling
Science of Security
Validation and Verification
CPS Technologies
Foundations
ACM CCS
CPS Technologies
Cyber Epidemic Dynamics
Cybersecurity dynamics
epidemic threshold
foundations
modeling
moving target defense
moving-target defense
Quantitative Verification
Science of Security
security models
systems engineering
Systems Security
validation and verification
ACM CCS
Moving-Target Defense
Systems Security
biblio
A New Approach to Modeling and Analyzing Security of Networked Systems
Submitted by shouhuai on Wed, 09/17/2014 - 6:30pm
Modeling
Resilient Systems
Science of Security
Foundations
foundations
modeling
Resilient Systems
Science of Security
Security analysis
Security Metrics
Security modeling
Software Security Metrics
ACM CCS
Cyber Security
Security Metrics
Software Security Metrics
biblio
A Rewriting-based Forwards Semantics for Maude-NPA
Submitted by Jose Meseguer on Wed, 09/17/2014 - 6:30pm
Modeling
Science of Security
Simulation
Foundations
ACM CCS
Applied cryptography
cryptographic protocol analysis
Cryptographic Protocols
Cryptography
foundations
logical narrowing-based reachability analysis
model checking
modeling
protocol verification
reasoning modulo an equational theory
Science of Security
simulation
standard rewriting-based model checking
term rewriting
ACM CCS
Cryptography
Applied Cryptography
Cryptographic Protocols
biblio
Architecture-based Self-protection: Composing and Reasoning About Denial-of-service Mitigations
Submitted by David Garlan on Wed, 09/17/2014 - 6:30pm
Architectures
Architectures
Modeling
Science of Security
Validation and Verification
CPS Technologies
Foundations
Hardware Security Implementation
validation and verification
Self-Adaptation
Security in Hardware
Science of Security
Probabilistic Model Checking
modeling
Logic and Verification
Hardware-Based Security Protocols
ACM CCS
foundations
Formal Security Models
Formal Methods and Theory of Security
Denial-of-Service
cyber security
CPS Technologies
Architectures
ACM CCS
Hardware-Based Security Protocols
Cyber Security
Formal Security Models
Formal Methods and Theory of Security
Logic and Verification
Hardware Security Implementation
Security in Hardware
biblio
HotSoS '14: Proceedings of the 2014 Symposium and Bootcamp on the Science of Security
Submitted by Laurie Williams on Wed, 09/17/2014 - 6:30pm
Architectures
Architectures
Control
Modeling
Science of Security
Foundations
Access Control
Architectures
control
distributed systems security
foundations
Human and Societal Aspects of Security and Privacy
modeling
moving-target defense
network security
Phishing
Science of Security
Social Engineering Attacks
Phishing
Access Control
Social Engineering Attacks
Human and Societal Aspects of Security and Privacy
Distributed Systems Security
Network Security
Moving-Target Defense
file
Trusted Computing in 2025?
Submitted by WarrenAHuntJr on Tue, 05/20/2014 - 3:19pm. Contributor:
Warren A. Hunt, Jr.
Session 4
risk analysis
modeling
security tools
Hardware
Software
The University of Texas at Austin
Cyber2025
2014
Session 4
Academia
Presentation
« first
‹ previous
1
2
3
4
5
6
7
8