Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
operating systems
biblio
Hardware-Based Memory Acquisition Procedure for Digital Investigations of Security Incidents in Industrial Control Systems
Submitted by grigby1 on Thu, 05/09/2019 - 10:47am
reliable code
malware
memory contents collecting
operating system
operating systems
operating systems (computers)
production engineering computing
pubcrawl
Reliability
malicious software functions
resilience
Resiliency
resulting contents
Scalability
scalable
security incidents
software methods
volatile memory
guaranteed reliability
attacked computer
comprehensive solutions
computer security
continuous monitoring systems
control engineering computing
data collection procedure
digital investigations
forensic
Operating systems security
hardware-based memory acquisition procedure
ICs
industrial control
Industrial Control Systems
information security
integrated circuits
invasive software
biblio
An SSH Honeypot Architecture Using Port Knocking and Intrusion Detection System
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
Linux
SSH service attack
SSH honeypot architecture
Software Architecture
Servers
secure shell honeypot
secure shell
Scalability
Resiliency
resilience
pubcrawl
port knocking
operating systems
authentication
kippo honeypot
IP networks
intrusion detection system
IDS
Human Factors
Human behavior
honeypot
honey pots
Force
computer network security
Computer crime
biblio
Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
resilience
IP networks
low interaction honeypots
low- interaction honeypot
low-interaction honeypot
operating systems
performance evaluation
Probes
pubcrawl
internet
Resiliency
Scalability
security
TCPIP
telecommunication security
tools
Windows - KFSensor
attack actions
inhibiting fingerprinting attacks
Human Factors
Human behavior
honey pots
fuzzy technique
fuzzy set theory
fingerprinting techniques
fingerprinting detection mechanism
fingerprinting attack tools
Fingerprint recognition
fingerprint low-interaction honeypots
data privacy
computer network security
completeness attack vectors
authorisation
biblio
Improving existing 6LoWPAN RPL for content based routing
Submitted by grigby1 on Wed, 01/16/2019 - 2:25pm
Reliability
low-power wireless personal area network
operating systems
operating systems (computers)
packet delivery ratio
personal area networks
power consumption
Power demand
pubcrawl
Linear programming
Resiliency
Routing
routing protocol for low power and lossy network
Routing protocols
sensor networks
telecommunication traffic
Traffic congestion
cooja
6LoWPAN RPL
CBR technique
composability
computer network reliability
Conferences
content based routing
content based routing technique
contiki operating system
6LoWPAN
cooja simulator.
data aggregation
data aggregation ratio
energy consumption
Energy Efficiency
home automation
Internet of Things
biblio
Ditio: Trustworthy Auditing of Sensor Activities in Mobile & IoT Devices
Submitted by grigby1 on Mon, 12/10/2018 - 11:30am
pubcrawl
composability
sensors
trustworthiness
Mobile and IoT devices
operating systems
security and privacy
biblio
A Content Auditing Method of IPsec VPN
Submitted by grigby1 on Wed, 11/14/2018 - 1:13pm
man-in-the-middle mechanism
Windows
VPN technology
Virtual private networks
Servers
Resiliency
resilience
public domain software
pubcrawl
prototype system
Protocols
operating systems (computers)
operating systems
microsoft windows
Metrics
encryption audits
IPv4 network environment
IPsec VPN users
IPsec VPN
IP networks
internet
encryption
DPDK technology
DPDK
default configuration
content auditing method
Compositionality
authentication
auditing
audit system
biblio
Investigating the Value of Privacy within the Internet of Things
Submitted by grigby1 on Wed, 09/05/2018 - 10:39am
Mobile communication
user privacy protection
Scalability
Resiliency
resilience
pubcrawl
PrivacyGate
privacy
phones
personal information
personal data exchange
operating systems
mobile computing
Android (operating system)
IoT transaction privacy
IoT devices
Internet of Things
human factor
Human behavior
game-theoretic concept
game theory
Data protection
data privacy
Computing Theory
Companies
Android operating system
biblio
Research of Security Risk in Electric Power Information Network
Submitted by grigby1 on Wed, 05/30/2018 - 4:01pm
power engineering computing
synthesis evaluation model
styling
security weaknesses
security risk
security of data
Security Evaluation
risk management
risk assess
Resiliency
resilience
pubcrawl
Production
power systems
power system management
collaboration
policy-based governance
password
operating systems
network security
multilevel fuzzy comprehensive judgment
Metrics
Human Factors
Human behavior
fuzzy set theory
fuzzy judgment
evaluation index system
electric power information network
Communication networks
biblio
In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
integrated modelling language
UNIX operating systems
UNIX operating system
Unix
self-replicating malware
Resiliency
resilience
pwnPr3d modelling approach
pubcrawl
operating systems
Metrics
invasive software
Analytical models
ICT systems
hardware components
Hardware
cybersecurity analysis
computer security
computer architecture
composability
attack graphs
architectural cyber security analysis
Architectural Analysis
biblio
Countermeasureing Zero Day Attacks: Asset-Based Approach
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
Predictive Metrics
zero-day attack detection
Zero Day Attacks and Defense
zero day attack countermeasureing
system calls
security of data
security models
security life cycle
security domain
security
Resiliency
pubcrawl
Zero day attacks
operating systems
Monitoring
Metrics
malware
Games
defense mechanisms
Databases
composability
Companies
asset-based approach
defense
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »