Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security policies
biblio
A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach
Submitted by aekwall on Mon, 06/17/2019 - 10:27am
alerts
full-scale effectiveness approach
effectiveness metrics
Effectiveness measurement
Distortion measurement
data visualisation
cyber-attacks
cyber security
cognitive load
circular visualization designs attract
Attention span
full-scale security visualization effectiveness framework
security policies
cognition
Data visualization
network security
Correlation
computer security
Decision Making
policy-based governance
pubcrawl
security of data
Security Visualization
visualization
visual clarity
user-centric visualization techniques
user response times
user cognition activators
understanding cyber-attacks
three-dimensional visualization
SvEm visualizations
SvEm framework key components
security visualization effectiveness measurement framework
Web Application Security
security insights
security incident entities
security events
real-time security visualization application
presentation approach
policy-making levels
multiuser collaboration
Mobile Security
mobile display dimension
full-scale security visualization effectiveness measurement
biblio
Too Long, Did Not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments
Submitted by aekwall on Mon, 06/17/2019 - 10:25am
analytic hierarchy process
policy-based governance
pubcrawl
risk analysis
Security Audits
security policies
Security Policies Analysis
Security Risk Management
usage control
biblio
An Automata-based Security Policy Translation for Network Security Functions
Submitted by aekwall on Mon, 06/17/2019 - 10:21am
Network Security Architecture
security policy translator
security policy translations
security policies
security of data
security controller
security
Resiliency
pubcrawl
Production
policy-based governance
Policy Translation
automata
IP networks
interface to network security functions
I2NSF user
I2NSF framework
Generators
Data models
Data mining
creating policies
computer network security
automata-based security policy translation
automata theory
biblio
A Markov Decision Process to Determine Optimal Policies in Moving Target
Submitted by aekwall on Mon, 06/17/2019 - 10:21am
Markov Decision Process
moving target defense
optimal policy
policy-based governance
pubcrawl
security policies
Security Policies Analysis
biblio
Pesos: Policy Enhanced Secure Object Store
Submitted by aekwall on Mon, 06/17/2019 - 10:21am
pubcrawl
policy-based governance
security policies
Intel SGX
kinetic disks
policy language
storage security
biblio
A Security Policy Enforcement Framework for Controlling IoT Tenant Applications in the Edge
Submitted by aekwall on Mon, 06/17/2019 - 10:21am
Policy Based Governance
Access Control
edge computing
IoT
model-driven security
policy-based governance
pubcrawl
security policies
services computing
ThingML
biblio
GUARDIA: Specification and Enforcement of Javascript Security Policies Without VM Modifications
Submitted by aekwall on Mon, 06/17/2019 - 10:20am
pubcrawl
policy-based governance
JavaScript
security policies
DSL
language design
reflection
runtime enforcement
security policy
web security
biblio
Distributed AI and Security Issues in Federated Environments
Submitted by aekwall on Mon, 06/17/2019 - 10:20am
federated systems
Generative Models
policy-based governance
pubcrawl
security policies
biblio
A Framework for Managing User-defined Security Policies to Support Network Security Functions
Submitted by aekwall on Mon, 06/17/2019 - 10:20am
pubcrawl
policy-based governance
NSF
security management
security policy
security policies
biblio
Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach
Submitted by grigby1 on Wed, 05/01/2019 - 11:34am
Metrics
verifying security policies
security policies
security of data
security
Scalability
Resiliency
resilience
Redundancy
pubcrawl
potential security breaches
Policy Validation and Correction.
pattern clustering
obtained clusters
nonallowed accesses
ABAC Policy
Image edge detection
edge detection
Conferences
composability
clustering technique
clustering
big data environments
Big Data
Anomaly Detection and Resolution
Anomaly Detection
access log based approach
Access Log
Access Control
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »