Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security policies
biblio
Automatic Data Model Mapper for Security Policy Translation in Interface to Network Security Functions Framework
Submitted by grigby1 on Mon, 04/18/2022 - 10:51am
Automatic Mapper
Data Model Mapper
Data models
Force
Generators
I2NSF
internet
network security
performance evaluation
policy-based governance
Policy Translation
Production
pubcrawl
security policies
biblio
Organizational Security Policy and Management during Covid-19
Submitted by grigby1 on Mon, 04/18/2022 - 10:51am
business continuity
computer security
COVID-19
cyber-attack
Cybersecurity
information technology
Organizations
Pandemics
Policy
policy-based governance
pubcrawl
security policies
biblio
A DNS Security Policy for Timely Detection of Malicious Modification on Webpages
Submitted by grigby1 on Mon, 01/31/2022 - 5:39pm
Browsers
web defacement
malicious modification
malicious browser extensions
websites
Telecommunications
Web Browser Security
Web pages
Phishing
Compositionality
security
domain name system
security policies
DNS
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Securely Distributing Files in Cloud Environment by Dispensing Asymmetric Key Management System applying Hashing
Submitted by aekwall on Mon, 01/10/2022 - 12:46pm
Software
Cloud Computing
encryption
Public key
pubcrawl
Metrics
Human behavior
Hash functions
data integrity
Asymmetric Encryption
Compression function
Data protection
security policies
Resiliency
Compositionality
biblio
Towards Improved Network Security Requirements and Policy: Domain-Specific Completeness Analysis via Topic Modeling
Submitted by grigby1 on Thu, 04/29/2021 - 2:17pm
Communication networks
Communication system security
completeness
empirical evaluation
Loading
machine learning
network security
policy-based governance
pubcrawl
Requirements quality
security
security policies
Semantics
Text recognition
wireless networks
biblio
PASAPTO: Policy-aware Security and Performance Trade-off Analysis–Computation on Encrypted Data with Restricted Leakage
Submitted by grigby1 on Thu, 04/29/2021 - 2:17pm
Cryptography
Decision trees
Heuristic algorithms
Java
optimization
policy-based governance
pubcrawl
security policies
Time measurement
biblio
Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy
Submitted by grigby1 on Thu, 04/29/2021 - 2:16pm
anonymization
Cyber-security
DNS
IPFIX
ISP
NetFlow
policy-based governance
privacy
pubcrawl
security policies
biblio
Through the Lens of Code Granularity: A Unified Approach to Security Policy Enforcement
Submitted by grigby1 on Thu, 04/29/2021 - 2:16pm
automata
Communication networks
Conferences
enforcement
Java
Monitoring
Policies
policy-based governance
pubcrawl
Runtime
security
security mechanisms
security policies
biblio
Nontransitive Security Types for Coarse-grained Information Flow Control
Submitted by grigby1 on Thu, 04/29/2021 - 2:16pm
Labeling
type systems
Software
security types
security policies
policy-based governance
noninterference
Lattices
language-based security
object oriented security
Information Flow Control
History
computer security
Computer languages
pubcrawl
Metrics
composability
Resiliency
biblio
A Policy-based Interaction Protocol between Software Defined Security Controller and Virtual Security Functions
Submitted by grigby1 on Thu, 04/29/2021 - 2:15pm
Protocols
virtual security function
software defined security service
Software
security protocol
security policies
security
SDN
pubcrawl
Network Security Architecture
Predictive models
policy-based governance
NFV
Monitoring
control systems
Cloud Security
Cloud Computing
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »