Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Resiliency
biblio
Arcaid: Addressing Situation Awareness and Simulator Sickness in a Virtual Reality Pac-Man Game
Submitted by grigby1 on Thu, 04/20/2017 - 11:45am
composability
game design
Metrics
pubcrawl
Resiliency
simulation sickness
situational awareness
virtual reality
biblio
Towards Future Situation-Awareness: A Conceptual Middleware Framework for Opportunistic Situation Identification
Submitted by grigby1 on Thu, 04/20/2017 - 11:44am
collaboration
composability
Metrics
middleware
opportunistic sensing
pubcrawl
Resiliency
security
situation identification
situation-aware
situational awareness
biblio
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures
Submitted by grigby1 on Thu, 04/20/2017 - 11:43am
IP networks
target services
Servers
Resiliency
Relays
pubcrawl
proxy-based architectures
proxy harvesting attack
Network reconnaissance
moving target defense approach
malicious client isolation
malicious client discovery
attacker reconnaissance effort
high-profile targets
end users
distributed denial of service attacks
DDoS attack mitigation
Conferences
computer network security
Computer crime
Communication networks
client-to-proxy assignment strategy
client shuffling
client remapping
biblio
On implementing a client-server setting to prevent the Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext (BREACH) attacks
Submitted by grigby1 on Thu, 04/20/2017 - 11:43am
Dictionaries
Bandwidth
BREACH attack
BREACH attacks
browser reconnaissance and exfiltration via adaptive compression of hypertext attacks
Browsers
client-server setting
client-server systems
Compression
Compression algorithms
confidentiality
Cryptographic Protocols
Cryptography
data compression
Data protection
DEFLATE compression algorithm
Web traffic
encoding
encryption
fixed-dictionary compression
high-value secrets protection
HTTP compression
Network reconnaissance
plaintext
pubcrawl
Resiliency
security
security model
Servers
SSL/TLS
TLS protocol
transport protocols
biblio
Reconnaissance of Industrial Control System by deep packet inspection
Submitted by grigby1 on Thu, 04/20/2017 - 11:43am
network protocol
Traffic classification
telecommunication traffic
Resiliency
Reconnaissance
pubcrawl
Protocols
Ports (Computers)
Payloads
network traffic
Network reconnaissance
Communication Network
integrated circuits
Inspection
Industrial Control System (ICS)
industrial control system
industrial control
electronic devices
Deep Packet Inspection (DPI)
deep packet inspection
complex system
biblio
Anonymous port scanning: Performing network reconnaissance through Tor
Submitted by grigby1 on Thu, 04/20/2017 - 11:43am
Network reconnaissance
Tor
scanning processes
scanning
scan rate
Resiliency
Reconnaissance
pubcrawl
Ports (Computers)
Nmap
Acceleration
Network interfaces
Management information systems
Linux
IP networks
internet
computer communications software
anonymous port scanning
anonymizing port scanning tools
anonymization
biblio
Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems
Submitted by grigby1 on Thu, 04/20/2017 - 11:43am
ABAC
Access Control
Algorithms
complexity
computer security
graph theory
insider
insider threat
Network reconnaissance
NGAC
NIST
policy machine
pubcrawl
Resiliency
simultaneous instantiation
XACML
biblio
A Scalable Threats Classification Model in Information Systems
Submitted by grigby1 on Thu, 04/20/2017 - 11:42am
information security
Network reconnaissance
pubcrawl
Resiliency
security dimension
security perspective
security risk
security threats
threat classification
biblio
Analysis on Manipulation of the MAC Address and Consequent Security Threats
Submitted by grigby1 on Thu, 04/20/2017 - 11:42am
countermeasure
hardware unique information
MAC address
Network reconnaissance
pubcrawl
Resiliency
security threats
biblio
A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models
Submitted by grigby1 on Thu, 04/20/2017 - 11:42am
anomaly detection system
insider threat
machine learning
Network reconnaissance
pubcrawl
Resiliency
« first
‹ previous
…
1186
1187
1188
1189
1190
1191
1192
1193
1194
…
next ›
last »