Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security policies
biblio
ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications
Submitted by aekwall on Mon, 04/13/2020 - 10:14am
ROS
SIEM
security event management system
SDN-based security policy enforcement
ROSDefender
ROS-Defender
robotics systems
robotics
Robotic system
OpenvSwitch
IPS
dynamic policy enforcement points
anomaly detection systems
intrusion prevention system
robotic applications
computer network security
robots
Robot sensing systems
security policies
SDN
Peer-to-peer computing
policy-based governance
pubcrawl
software defined networking
Linux
security
Access Control
Servers
firewall
biblio
Runtime and Routing Security Policy Verification for Enhanced Quality of Service of IoT Networks
Submitted by aekwall on Mon, 04/13/2020 - 10:13am
software-defined networking
Service efficiency problems
routing security policy verification
interconnected devices
security policy
security policies
IoT network
quality of service
delays
network traffic
Monitoring
telecommunication network routing
Routing
policy-based governance
pubcrawl
security
Runtime
telecommunication security
Internet of Things
telecommunication traffic
biblio
On the Impact of Generative Policies on Security Metrics
Submitted by aekwall on Mon, 04/13/2020 - 10:13am
Security Metrics
security policies generation
policy basedsecurity management
generative policy based system
administrative overhead
Manuals
complex systems
security policies
security management
computer network security
Measurement
computer security
Grammar
policy-based governance
pubcrawl
computer network management
Access Control
authorisation
biblio
A Study on Data Security and Query privacy in Cloud
Submitted by grigby1 on Fri, 04/03/2020 - 12:33pm
multifactor authentication
wide set
security policies
security of data
scalable resources
Scalability
Safety
pubcrawl
privacy problems
Privacy Policies
privacy contemplations
privacy
power system security
Oblivious RAM
noteworthy economic assistances
multioccupancy
authentication
Human behavior
high-tech tasks
encryption
effective resolutions
Economics
decreased operational expenditures
data privacy
data defence failures
confidentiality
Cloud Security
cloud platforms
cloud computing situations
Cloud Computing
Big Data
biblio
Enforcing Multilevel Security Policies in Database-Defined Networks using Row-Level Security
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
row-level security checks
policy-based governance
pubcrawl
relational database security
relational databases
Resiliency
Routing
routing configuration
Row-Level Security
Policy Based Governance
security
security of data
security policies
Software Defined Network
software defined networking
software-defined networking
standards
Structured Query Language
Human behavior
collaboration
composability
computer networks
database management systems
database tables
database-defined network
Database-Defined Networking
fine-grained security policies
business requirements
Information Flow Control
Metrics
multilevel security
multilevel security policies
network configuration
network hardware administration
network topology
biblio
Automated IT Audit of Windows Server Access Control
Submitted by aekwall on Mon, 03/09/2020 - 11:05am
Scalability
IT Audit
IT auditing process
microsoft windows
Microsoft Windows (operating systems)
Object recognition
password
pubcrawl
Resiliency
ISO/IEC 27002:2013
Security Audits
security controls
security policies
security weaknesses
Servers
Windows Server
Windows server access control
Windows server operating system
automated IT audit
Access Control
access control violations
audit checklist
audit objectives
auditing
auditing processes
authorisation
automated audit tool
Windows Operating System Security
automated process
business data processing
data breach incidents
Human behavior
IEC standards
intrusion incidents
ISO standards
biblio
Hybrid Approach for Detecting DDOS Attacks in Software Defined Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:42pm
SDN controller
Measurement
Metrics
network flow
normal flow
open source product
packet flow
pattern classification
precision rate
privacy
pubcrawl
malicious flow
security policies
security threats
software defined networking
Software Defined Networks
support vector machine
Support vector machines
telecommunication traffic
threat vectors
unclassified techniques
data set
ANN
Bayesian network
central point
classified techniques
Computer crime
computer network management
computer network security
control systems
data flow
and SVM
DDoS Attacks
DDOS attacks detection
destructive attack
hybrid Machine Learning techniques
KNN
learning (artificial intelligence)
machine learning
machine learning algorithms
machine learning techniques
biblio
The Location-Centric Approach to Employee's Interaction Pattern Detection
Submitted by grigby1 on Tue, 01/21/2020 - 11:24am
Insider Threat Detection
Access Control
access control system
authorisation
business data processing
business processes
collaboration
data analysis
Data mining
data visualisation
Data visualization
employee interaction pattern detection
Human behavior
information security
insider threat
visualization-driven technique
location-centric approach
location-centric bevavior patterns
Metrics
Organizations
Personnel
policy-based governance
pubcrawl
resilience
Resiliency
security policies
sensors
step charts
Task Analysis
biblio
Security Assessment of Libyan Government Websites
Submitted by grigby1 on Wed, 10/23/2019 - 12:39pm
security issues
Reconnaissance
resilience
Resiliency
Safety
Scalability
secure programming practices
security assessment
security assessment results
pubcrawl
security level
security of data
security policies
SSL Trust Models
vulnerability assessment
Web sites
Website Vulnerability
internet
Cryptography
data privacy
E-Government
encryption
Government
government data processing
Human behavior
In formation Security
Computer crime
Libya E-government
Libyan government websites
Metrics
Penetration Testing
privacy
privacy polic
Privacy Policy
biblio
Efficient and Safe Control Flow Recovery Using a Restricted Intermediate Language
Submitted by grigby1 on Thu, 09/26/2019 - 10:24am
security
program diagnostics
program verification
pubcrawl
resilience
Resiliency
restricted control transition intermediate language
Safe Coding
safe control flow recovery
program compilers
security mechanisms
security of data
security policies
Security Validation
Semantics
software fault tolerance
source code level
Explosions
Bianry Analysis
collaboration
Computational modeling
Conferences
Control Flow Recovery
control-flow recovery
data flow analysis
data-flow analyses
automatic analysis
Formal Specification
Human behavior
Human Factors
low-level object code
Memory management
Metrics
policy-based governance
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »