Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
operating systems
biblio
Cluster-Based Vulnerability Assessment Applied to Operating Systems
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
Predictive models
Windows operating system
Windows
vulnerability records
vulnerability assessment
Stochastic processes
software reliability models
software reliability
Software
security
Resiliency
resilience
pubcrawl
clustering
OSs
operating systems
nonhomogeneous Poisson process
monotonic intensity function assumption
Metrics
mean value function
Linux
Databases
Curve fitting
Correlation
composability
biblio
Unified Approach for Operating System Comparisons with Windows OS Case Study
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
Three-dimensional displays
operational level benchmarking
operational level performance
OS security features
pubcrawl
resilience
Resiliency
security
security of data
operating systems (computers)
unified approach
unified benchmarking approach
Windows 7
Windows 8
Windows operating system
Windows OS
Windows OS case study
Windows XP
graphics processing units
Benchmark testing
Benchmarking
composability
conventional personal computer
DirectX 11
efficient benchmark systems
gpu
Graphics
automated benchmarking tools
Hardware
hardware level
hardware technology
Metrics
microsoft windows
operating system
operating systems
biblio
Enhanced Operating System Protection to Support Digital Forensic Investigations
Submitted by grigby1 on Mon, 03/05/2018 - 1:06pm
operating systems (computers)
forensic-friendly OS design
Forensics
fully homomorphic encryption
Metrics
obfuscation
operating system extensions
operating system protection
operating systems
Forensic software
OS tamper-resistance
pubcrawl
resilience
Resiliency
security
system data recovery
White Box Encryption
white-box cryptography
Cryptography
CEF
Ciphers
component encryption
composability
computer systems
computing on encrypted data
computing with encrypted functions
criminal activity footprints
CED
data integrity
data provenance
data veracity
digital forensic investigations
Digital Forensics
encryption
evidence collection
biblio
SPE: Security and Privacy Enhancement Framework for Mobile Devices
Submitted by K_Hooper on Wed, 02/28/2018 - 11:35am
Multimedia communication
unmodified mobile operating systems
SPE
sensors
sensing
security of data
security and privacy enhancement
security
Resiliency
pubcrawl
privacy
operating systems (computers)
operating systems
Ontology
ontologies (artificial intelligence)
Ontologies
android
Mobile Security
mobile privacy
Mobile handsets
mobile devices
mobile computing
Metrics
iOS Security
iOS (operating system)
ios
Human Factors
encryption
data privacy
Compositionality
Android (operating system)
biblio
Reinforcing Security Requirements with Multifactor Quality Measurement
Submitted by grigby1 on Thu, 02/15/2018 - 11:49am
security requirements
quantitative statistical analysis
requirements analysts
requirements elicitation
requirements engineering
resilience
Resiliency
scenarios
security of data
security quality ratings
qualitative analysis
security requirements elicitation
security requirements reinforcement
software quality
Stakeholders
statistical analysis
user study
vignettes
weak security constraints
minimal analyst expertise
authentication
Context
Databases
elicited expert preferences
Formal Specification
Human behavior
human factor
Human Factors
Metrics
Analytical models
MQM
multifactor authentication
Multifactor Quality measurement
Multifactor Quality Method
natural language scenarios
Natural languages
operating systems
pubcrawl
biblio
Entropy-Based Security Analytics: Measurements from a Critical Information System
Submitted by grigby1 on Tue, 02/06/2018 - 1:33pm
Information systems
text analytics
security of data
security
Scalability
Runtime
real-world air traffic control information system
pubcrawl
operating systems
Metrics
log analytics
Intrusion Detection
air traffic control
Human Factors
Human behavior
Filtering
Event logging
entropy-based security analytics
Databases
Data mining
data analytics framework
critical information system
composability
biblio
SPEProxy: Enforcing fine grained security and privacy controls on unmodified mobile devices
Submitted by grigby1 on Tue, 01/23/2018 - 3:07pm
composability
Engines
Metrics
Mobile communication
Mobile handsets
operating systems
Operating systems security
privacy
Privacy Policies
pubcrawl
Resiliency
security
Synchronization
Ubiquitous Computing Security
biblio
Towards comprehensive protection for OpenFlow controllers
Submitted by grigby1 on Wed, 01/10/2018 - 12:24pm
Cross Layer Security
Virtual machine monitors
telecommunication control
security
Resiliency
pubcrawl
operating systems
OpenFlow critical component
OpenFlow controller
malicious controller
Industrial Control Systems
dynamic networks
adaptive networks
cross layer diversity
control systems
control plane-data ploane decoupling
control logic
computer network security
Computer bugs
computer architecture
composability
Attack vectors
agile networks
biblio
A Security Analysis Method for Supercomputing Users \#x2019; Behavior
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
Protocols
Virtual private networks
supercomputing user behavior
supercomputing business process
Supercomputers
supercomputer
Security Policies Analysis
security of data
security level optimization
security level improvement
security incident detection
security analysis method
security
resource use tracking
pubcrawl
audit policy
policy-based governance
operation records
operating systems
mass storage
mainframes
log analysis
Linux
Human Factors
Correlation analysis
Correlation
complete user behavior path restoration
collaboration
business data processing
biblio
NSF GENI cloud enabled architecture for distributed scientific computing
Submitted by grigby1 on Mon, 12/04/2017 - 12:58pm
research institute
networking traffic
North Carolina
NSF GENI cloud enabled architecture
Open Resource Control Architecture
operating systems
ORCA based GENI rack
parallel processing
provisioned L2 network domain
pubcrawl
Renaissance Computing Institute
RENCI
networking systems
Resiliency
Scientific Computing Security
scientific information systems
SDN controllers
Servers
software defined networking
software defined networking controllers
United States
virtual laboratory
virtual machines
Global Environment-for-Network Innovations
Cloud Computing
cloud federation
cloud resources
Compositionality
computer architecture
data transfer
distributed resource orchestration system
distributed scientific computing
distributed systems
Fabrics
GENI resources
baremetals
graphical user interfaces
Hardware
high-performance computing
high-throughput computing
HPC
HTC
Internet2 L2 service
L2 network domain
Metrics
National Science Foundation funded program
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »