Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security policies
biblio
From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Mobile handsets
ubiquitous computing
stochastic programming models
stochastic programming
security policy planning
security policies
security of data
security economics
reactionary security
pubcrawl
proactive security
policy-based governance
Policy
Access Control
mathematical optimization
Government
Governance
context-aware security policy management
Context-aware security
context-aware computing
Context modeling
Context
Computational modeling
collaboration
Adaptation models
biblio
Ambiguity as a Barrier to Information Security Policy Compliance: A Content Analysis
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Natural languages
Usable Security
text analysis
South Africa
Software
Security policy compliance
security policies
security of data
pubcrawl
policy-based governance
Policy human aspects
Policy clarity
Policy ambiguity
Policy
collaboration
institutional information resources
InfoSec policy document
Information services
information security policy compliance
information security
Guidelines
Government
Governance
Educational institutions
educational institution
education
Content analysis
biblio
Research of Secure Service Composition Based on Semantic Security Policy
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Protocols
web services
syntactic approaches
subsumption
service composition
Semantics
semantic security policy
Semantic
security policy
security policies
security of data
secure service composition
pubcrawl
cognition
policy-based governance
Policy
ontologies (artificial intelligence)
Ontologies
matching algorithm
government policies
Government
Governance
general security ontology
encryption
definition method
collaboration
biblio
Security policy transition framework for Software Defined networks
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Policy
Software Defined Networks
software defined networking
Software
Security Policy Transitions
security policy transition framework
security policies
SDN environments
SDN
Ryuretic
RYU
pubcrawl
programming frameworks
Ports (Computers)
policy-based governance
Access Control
NOS
Network Security Policies
network operating system
network application development
Network Access Control
NAC
Monitoring
Kinetic theory
Government
Governance
external command
computer network security
collaboration
biblio
A Tripwire Grammar for Insider Threat Detection
Submitted by grigby1 on Fri, 10/27/2017 - 12:10pm
Metrics
pubcrawl
Resiliency
Human behavior
Scalability
attack-pattern
Grammar
insider threat
security policies
tripwire
threat mitigation
biblio
A Tripwire Grammar for Insider Threat Detection
Submitted by grigby1 on Tue, 08/22/2017 - 11:47am
attack-pattern
collaboration
Grammar
Human behavior
Human Factors
insider threat
Insider Threats
Metrics
pubcrawl
Resiliency
security policies
tripwire
biblio
Automatic generation of Content Security Policy to mitigate cross site scripting
Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
JavaScript
XSS
Web server layer
Web attack mitigation
Web attack detection
Web application
URL
Uniform resource locators
static contents
Servers
security policies
security of data
security
Resiliency
pubcrawl
Algorithm design and analysis
Java
internet
information technology
Human behavior
HTML
Databases
CSP mechanism
CSP
cross-site scripting mitigation
Cross Site Scripting
Cross Layer Security
composability
client-side security layer
automatic content security policy generation
biblio
"Advanced Persistent Threats - detection and defense"
Submitted by abfox on Tue, 02/14/2017 - 12:11pm
Data protection
software IDS tools
Servers
security upgrades
security policies
pubcrawl170101
Organizations
Monitoring
malware
encryption
Access Control
Data mining
Cryptography
computer systems
command and control systems
authorisation
Attack vectors
Anomaly Detection
advanced persistent threats
biblio
Monitoring Security Compliance of Critical Processes
Submitted by BrandonB on Tue, 05/05/2015 - 10:20am
predictive security analysis
security policies
security monitoring
security modeling and simulation
security information and event management
security compliance
security
Runtime
process-aware information systems
process specifications
process behavior model
process behavior analysis
automata
Predictive models
power system security
operational formal models
Monitoring
model-based support
hydroelectric power stations
hydroelectric power plant
critical processes
critical infrastructures
Computational modeling
Business
biblio
Enforceable Security Policies
Submitted by JColeman on Wed, 12/10/2014 - 12:43pm
EM security policies
inlined reference monitors
proof carrying code
safety properties
SASI
Science of Security Significant Paper
security automata
security policies
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »