Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber security
biblio
Securing Hadoop in Cloud
Submitted by vouk on Wed, 09/17/2014 - 5:32pm
Control
Science of Security
Foundations
ACM CCS
cloud
control
Cryptography
cyber security
foundations
Hadoop
key management
lack of fine-grained access control
Operating systems security
overloaded authentication key
Science of Security
security
Systems Security
Virtualization and Security
ACM CCS
Cryptography
Cyber Security
Key Management
Virtualization and Security
Operating Systems Security
Systems Security
biblio
Channel Correlation Modeling for Link Signature Security Assessment
Submitted by Huaiyu on Wed, 09/17/2014 - 5:32pm
Wireless Sensing and Actuation
Science of Security
CPS Technologies
Foundations
ACM CCS
channel correlation
CPS Technologies
cyber security
foundations
link signature
physical layer security
Science of Security
Systems Security
wireless sensing and actuation
ACM CCS
Cyber Security
Systems Security
biblio
Building the Security Behavior Observatory: An Infrastructure for Long-term Monitoring of Client Machines
Submitted by aforget on Wed, 09/17/2014 - 5:32pm
Architectures
Architectures
ACM CCS
Architectures
CPS Technologies
cyber security
Database and Storage Security
foundations
Hardware Security Implementation
Human and Societal Aspects of Security and Privacy
Management and Querying of Encrypted Data
Science of Security
Security in Hardware
USE: User Security Behvaior
ACM CCS
Cyber Security
Database and Storage Security
Management and Querying of Encrypted Data
Hardware Security Implementation
Human and Societal Aspects of Security and Privacy
Security in Hardware
biblio
Limiting Recertification in Highly Configurable Systems: Analyzing Interactions and Isolation Among Configuration Options
Submitted by Pfeffer Juergen on Wed, 09/17/2014 - 5:32pm
Certification
Concurrency and Timing
ACM CCS
certification
composability
concurrency and timing
configuration options
cyber security
Formal Methods and Theory of Security
foundations
Logic and Verification
network analysis
Science of Security
Security Metrics
validation and verification
ACM CCS
Cyber Security
Formal Methods and Theory of Security
Logic and Verification
biblio
Personalized Password Guessing: A New Security Threat
Submitted by Zbigniew Kalbarczyk on Wed, 09/17/2014 - 5:31pm
Modeling
Science of Security
Foundations
ACM CCS
cyber security
foundations
Graphical Model
guessing
Human and Societal Aspects of Security and Privacy
modeling
password
personalized
Science of Security
suggestion
ACM CCS
Cyber Security
Human and Societal Aspects of Security and Privacy
Data Driven Security Models and Analysis
biblio
Preemptive Intrusion Detection
Submitted by Zbigniew Kalbarczyk on Wed, 09/17/2014 - 5:31pm
Systems Engineering
Modeling
Science of Security
CPS Technologies
Foundations
ACM CCS
CPS Technologies
credential stealing attack
cyber security
cyber-system
factor graph
foundations
Graphical Model
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
modeling
Science of Security
security incident
systems engineering
tagging
timeliness
ACM CCS
Cyber Security
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
Data Driven Security Models and Analysis
biblio
An Analysis Method for Medical Device Security
Submitted by arnabray on Wed, 09/17/2014 - 5:31pm
CPS Domains
Medical Devices
Health Care
Science of Security
Foundations
ACM CCS
CPS Domains
cyber security
foundations
health care
medical device security
medical devices
Science of Security
Software and Application Security
Web Application Security
ACM CCS
Cyber Security
Web Application Security
Software and Application Security
biblio
InViz: Instant Visualization of Security Attacks
Submitted by llayman on Wed, 09/17/2014 - 5:31pm
Concurrency and Timing
Real-time Systems
Real-Time Coordination
Science of Security
Foundations
ACM CCS
concurrency and timing
Cyber Attacks
cyber security
Cybersecurity
foundations
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
log file
real-time analysis
Real-Time Coordination
real-time systems
Science of Security
visualization
ACM CCS
Cyber Attacks
Cyber Security
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
biblio
Emergent Behavior in Cybersecurity
Submitted by shouhuai on Wed, 09/17/2014 - 5:31pm
Science of Security
Foundations
ACM CCS
cyber security
Cybersecurity
Emergent Behavior
foundations
Human and Societal Aspects of Security and Privacy
Science of Security
Security Properties
ACM CCS
Cyber Security
Human and Societal Aspects of Security and Privacy
biblio
Less is More?: Investigating the Role of Examples in Security Studies Using Analogical Transfer
Submitted by arao on Wed, 09/17/2014 - 5:30pm
Systems Engineering
ACM CCS
Analogical Transfer
CPS Technologies
cyber security
foundations
Human and Societal Aspects of Security and Privacy
Human Factors
psychology
Science of Security
security
Social Aspects of Security and Privacy
systems engineering
Usable Formal Methods for the Design and Composition of Security and Privacy Policies
ACM CCS
Cyber Security
Social Aspects of Security and Privacy
Human and Societal Aspects of Security and Privacy
« first
‹ previous
…
25
26
27
28
29
30
31
32
33
next ›
last »