Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cybersecurity
biblio
Game Theoretic-Based Approaches for Cybersecurity-Aware Virtual Machine Placement in Public Cloud Clusters
Submitted by aekwall on Mon, 06/08/2020 - 10:26am
cybersecurity loss awareness
VM-to-VM cybersecurity interdependency risks
two-player zero-sum game
static VM allocation
resource utilization
public cloud clusters
operating expense
multidimensional bin packing approaches
mathematical programming approach
large-scale cloud data centers
game theoretic-based approaches
equilibrium allocation strategies
cybersecurity-aware virtual machine placement
cybersecurity-aware consolidation algorithms
security of data
mathematical programming
game theoretic security
game model
virtual machines
Predictive Metrics
Human Factors
resource allocation
Cybersecurity
pubcrawl
game theory
Scalability
Cloud Computing
biblio
SDNLog-Foren: Ensuring the Integrity and Tamper Resistance of Log Files for SDN Forensics using Blockchain
Submitted by grigby1 on Wed, 06/03/2020 - 11:02am
SDN security
log management
Metrics
network forensics
pubcrawl
resilience
Resiliency
Scalability
SDN forensics
log file identification
SDNLog-Foren
Secure log files
security enhancement
sensitive log data
software defined networking
Southbound interfaces
system monitoring
fine-grained access control
blockchain
Blockchain-based security
Computer crime
Computer hacking
computer network security
control systems
Cybersecurity
Digital Forensics
authorisation
global network configuration
Human behavior
Human Factors
information forensics
Integrity and Tamper Resistance.
log file analysis
log file collection
biblio
SDN-based hybrid honeypot for attack capture
Submitted by aekwall on Mon, 06/01/2020 - 9:42am
high-level attacks
Mininet
telecommunication control
attack capture
attack traffic migration
Cybersecurity
flow control
flow control technology
high-interaction honeypot
Switches
hybrid honeypot system
network spoofing technology
network topology simulation
SDN-based hybrid honeypot
Topology simulation
Traffic migration
honey pots
computer network security
honeypot
Human Factors
telecommunication network topology
pubcrawl
Topology
SDN controller
SDN
Generators
network topology
Resiliency
software defined networking
Protocols
telecommunication traffic
Scalability
IP networks
biblio
The curse of software: Pentagon telecommunications case
Submitted by grigby1 on Fri, 05/22/2020 - 1:16pm
Advanced Intelligent Network
composability
Cybersecurity
Defense Red Switched Network
Government Accountability Office
Information Enterprise Architecture
Internet Protocol
Metrics
network accountability
pubcrawl
resilience
Resiliency
signaling protocol SS7
biblio
An Adaptive Threshold Method for Anomaly-based Intrusion Detection Systems
Submitted by aekwall on Mon, 05/11/2020 - 10:19am
microsoft windows
suspicious behaviors
normal data instances
normal behaviors
dynamic network environment
dynamic environment
Bipartite graph
Anomaly-based Detection Systems attempt
ADS
adaptive threshold method
adaptive systems
abnormal behaviors
intrusion
Trust management
anomaly-based Intrusion Detection Systems
network security
computer network security
statistical analysis
probability
Anomaly Detection
Cybersecurity
internet
network intrusion detection
Statistics
trust
Metrics
Peer-to-peer computing
composability
pubcrawl
Resiliency
IP networks
biblio
Detecting Exploit Websites Using Browser-based Predictive Analytics
Submitted by grigby1 on Fri, 04/17/2020 - 9:44am
Cybersecurity
Web Browser Security
Web-based computing
Web sites
Web browsers
web browser vulnerabilities
tool development
threat detection
Predictive Analytics
machine learning-powered predictive analytical model
human computer interaction
Data Analytics
browser-based predictive analytics
Compositionality
learning (artificial intelligence)
Metrics
Information analysis
Web browser
composability
cyberattacks
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
machine learning
biblio
On Security Threats of Botnets to Cyber Systems
Submitted by aekwall on Mon, 04/13/2020 - 9:06am
Internet connected hosts anonymously
Internet of Things devices
distributed denial of service attacks
fraud
network topology
botnets security threats
cyber systems
Distributed Denial of Service (DDoS) attacks
fully functional botnet
botnets
Internet of Things (IoT) devices
launch mass financial fraud campaigns
public opinion
social media bots
sophisticated botnet
sophisticated intrusion detection systems
undertake intricate spam campaigns
Security by Default
DDoS Attacks
Computer crime
computer network security
IP networks
Scalability
Internet of Things
IoT devices
Task Analysis
invasive software
botnet
learning (artificial intelligence)
Resiliency
pubcrawl
social networking (online)
internet
machine learning techniques
Cybersecurity
biblio
Power of Communication Behind Extreme Cybersecurity Incidents
Submitted by grigby1 on Fri, 04/10/2020 - 11:53am
Phishing
surrounding threats
security of data
Scalability
risk mitigations
risk management
risk analysis
Resiliency
resilience
pubcrawl
Protocols
Computational modeling
Pervasive Computing Security
Metrics
internet
Human Factors
Human behavior
extreme cybersecurity incidents
Electronic mail
Cyberspace
Cybersecurity
file
CYDER- CYbersecure Distribution systems with power Electronically interfaced Renewables
Submitted by mehrizi on Wed, 04/08/2020 - 2:33pm. Contributors:
Ali Mehrizi-Sani
Cheng-Ching Liu
Cybersecurity
power electronics
renewables
detection
Lightning Talks
1837700
CPS PI Meeting 2019
Lightning Talks
Presentation
biblio
Bitcoin Security Reference Model: An Implementation Platform
Submitted by aekwall on Mon, 04/06/2020 - 9:14am
digital wallet
security services
security risk minimization
security functional architecture
Scalability
Resiliency
pubcrawl
peer to peer security
P2P transaction
Metrics
IP protocol
IP networks
Human Factors
application protocol
digital money
decentralized payment system
Cybersecurity
Cryptographic Protocols
cryptocurrency
cryptocurrencies
Bitcoin security reference model
Bitcoin security features
bitcoin security
Bitcoin cyberattacks
bitcoin
« first
‹ previous
…
22
23
24
25
26
27
28
29
30
…
next ›
last »