Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information management
biblio
Towards Improving Web Attack Detection: Highlighting the Significant Factors
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
internet
XSS
Web attack detection
Web application vulnerabilities
Web Application Security
Web application protection
Uniform resource locators
session management
pubcrawl170109
Monitoring
IP networks
Intrusion Detection
broken authentication
injection
information management
information access
hackers
e-business
denial of service attack
Data protection
cyber attack
cross-site scripting
Computer crime
Buffer overflows
biblio
Security QoS profiling against cyber terrorism in airport network systems
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
cloud based network
distributed DoS
denial of service
DDoS
cyber terrorists
cyber terrorism
critical network assets
Computer crime
cloud infrastructure
Cloud Datacenters
Cloud Computing
cloud based platform
DoS
Cisco 9000 router firewall
aviation industry
attacks
Atmospheric modeling
Airports
airport network systems
airport information resource management systems
airport information network services
AIRMS
air traffic control
pubcrawl170109
VBDDA
telecommunication network routing
system response metrics
stateful packet inspection
SPI-OACI
security QoS profiling
robust counter security network model
riverbed modeler software
quality of service profiling
quality of service
virtual DDoS protection
OpenFlow application centric infrastructure
Nigerian aviation industry
mitigation techniques
mission critical services
MCS
information management
Floods
firewalls
embedded systems
embedded network device
biblio
An evolutionary game-theoretic framework for cyber-threat information sharing
Submitted by grigby1 on Tue, 03/07/2017 - 1:31pm
evolutionary stable strategy
Statistics
spanning industry
Sociology
self-enforced evolutionary stability
security of data
pubcrawl170109
military agencies
Investment
information sharing
information management
Incentive Model
Games
game theory
federal institutions
academia
Evolutionary Game Theory
evolutionary game theoretic strategy
evolutionary game theoretic framework
evolutionary computation
ESS
CYBEX framework
CYBEX
cybersecurity information exchange
Cybersecurity
cyber threat information sharing
cyber crimes
computer security
combat cyber attacks
collaborative effort
biblio
"Security information sharing for the polish power system"
Submitted by abfox on Tue, 02/14/2017 - 2:24pm
multi-agent systems
Substations
substation
Stakeholders
security of data
SCADA systems
SCADA system
pubcrawl170101
power system security
power generation
power engineering computing
Polish power system
multiagent architecture
anonymity
information sharing security
information sharing
information security
information management
information exchange
information and communication technology
Electric Grid
distributed control system
distributed control
cybersecurity technology
cyberattack
Computer crime
biblio
Big data analysis system concept for detecting unknown attacks
Submitted by BrandonB on Wed, 05/06/2015 - 10:41am
future attack detection
unknown attack detection
state agencies
service destruction
security systems
security
prevention system
personal information leakage
pattern matching methods
Monitoring
large-scale system attacks
Intrusion Detection
information management
information extraction
hacking attacks
advanced persistent threat detection
detection rate
defence technologies
Data storage systems
Data models
Data mining
data handling
cyber-attacks
critical infrastructures
Computer crime
Big Data analysis techniques
Big Data analysis system
Big Data
APT detection
Alarm systems
biblio
Unified multi-critical infrastructure communication architecture
Submitted by BrandonB on Tue, 05/05/2015 - 12:38pm
Interdependency
unified multicritical infrastructure communication architecture
Subscriptions
situational awareness
security
quality of service
Publish/Subscribe
private sector
Monitoring
interdependent infrastructure nodes
communication model
information sharing
information network
information management
government sector
Data models
critical infrastructures
critical infrastructure
computer network reliability
biblio
In Sensors We Trust – A Realistic Possibility?
Submitted by BrandonB on Tue, 05/05/2015 - 11:43am
Data mining
computer architecture
Buildings
architecture
information dissemination
information management
information sharing
processing architecture
secure systems
security
sensing infrastructure
sensor information flow
sensors
biblio
A secure cloud computing based framework for big data information management of smart grid
Submitted by BrandonB on Tue, 05/05/2015 - 9:26am
Cloud Computing
computer architecture
Identity-based encryption
information management
Smart Grids
biblio
IoT and cloud convergence: Opportunities and challenges
Submitted by BrandonB on Mon, 05/04/2015 - 2:36pm
Cloud Computing
cloud convergence
cloud ecosystem
cognitive-IoT capabilities
convergence
data handling
Data storage systems
everything as a service model
information management
Internet of Things
IoT centric cloud smart infrastructure
Reliability
biblio
In Sensors We Trust – A Realistic Possibility?
Submitted by BrandonB on Thu, 04/30/2015 - 1:39pm
sensors
sensor information flow
sensing infrastructure
security
secure systems
processing architecture
information sharing
information management
information dissemination
Data mining
computer architecture
Buildings
architecture
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »