Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
CPS Technologies
biblio
Parallel Simulation and Virtual-machine-based Emulation of Software-defined Network
Submitted by awhitesell on Tue, 04/12/2016 - 3:40pm
Science of Security
Simulation
Foundations
CPS Technologies
Discrete event
distributed
foundations
network security
NSA SoS Lablets Materials
parallel
Science of Security
simulation
software-defined networking
UIUC
virtual line
UIUC
Network Security
NSA SoS Lablets Materials
A Hypothesis Testing Framework for Network Security
biblio
Modeling and Sensing Risky User Behavior on Mobile Devices
Submitted by enck on Wed, 09/17/2014 - 6:32pm
Wireless Sensing and Actuation
Science of Security
CPS Technologies
Foundations
ACM CCS
CPS Technologies
cyber security
foundations
Human and Societal Aspects of Security and Privacy
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
mobile
Mobile and Wireless Security
network security
Science of Security
security
User behavior
wireless sensing and actuation
ACM CCS
Cyber Security
Intrusion Detection Systems
Mobile and Wireless Security
Human and Societal Aspects of Security and Privacy
Intrusion/Anomaly Detection and Malware Mitigation
Network Security
biblio
Diversity-based Detection of Security Anomalies
Submitted by vouk on Wed, 09/17/2014 - 6:32pm
Testing
Systems Engineering
Science of Security
Validation and Verification
CPS Technologies
Foundations
ACM CCS
Attack detection
CPS Technologies
cyber security
diversity
foundations
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
redundancy in security
Science of Security
systems engineering
testing
validation and verification
web services
ACM CCS
Cyber Security
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
biblio
Secure-by-construction Composable Componentry for Network Processing
Submitted by Heather Lucas on Wed, 09/17/2014 - 6:32pm
Embedded Software
Systems Engineering
Science of Security
CPS Technologies
Foundations
foundations
Tamper-Proof/Resistant Designs
systems engineering
Symmetric Cryptography and Hash Functions
stream processing
Security in Hardware
secure-by-construction
Science of Security
network processor
line-speed processor
hardware-software co-design
100 Gbps
Embedded Systems Security
embedded software
embedded hardware
Database and Storage Security
Data Anonymization and Sanitization
Cryptography
CPS Technologies
Block and Stream Ciphers
ACM CCS
ACM CCS
Cryptography
Block and Stream Ciphers
Data Anonymization and Sanitization
Embedded Systems Security
Database and Storage Security
Tamper-Proof/Resistant Designs
Security in Hardware
Symmetric Cryptography and Hash Functions
biblio
Channel Correlation Modeling for Link Signature Security Assessment
Submitted by Huaiyu on Wed, 09/17/2014 - 6:32pm
Wireless Sensing and Actuation
Science of Security
CPS Technologies
Foundations
ACM CCS
channel correlation
CPS Technologies
cyber security
foundations
link signature
physical layer security
Science of Security
Systems Security
wireless sensing and actuation
ACM CCS
Cyber Security
Systems Security
biblio
Building the Security Behavior Observatory: An Infrastructure for Long-term Monitoring of Client Machines
Submitted by aforget on Wed, 09/17/2014 - 6:32pm
Architectures
Architectures
ACM CCS
Architectures
CPS Technologies
cyber security
Database and Storage Security
foundations
Hardware Security Implementation
Human and Societal Aspects of Security and Privacy
Management and Querying of Encrypted Data
Science of Security
Security in Hardware
USE: User Security Behvaior
ACM CCS
Cyber Security
Database and Storage Security
Management and Querying of Encrypted Data
Hardware Security Implementation
Human and Societal Aspects of Security and Privacy
Security in Hardware
biblio
Preemptive Intrusion Detection
Submitted by Zbigniew Kalbarczyk on Wed, 09/17/2014 - 6:31pm
Systems Engineering
Modeling
Science of Security
CPS Technologies
Foundations
ACM CCS
CPS Technologies
credential stealing attack
cyber security
cyber-system
factor graph
foundations
Graphical Model
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
modeling
Science of Security
security incident
systems engineering
tagging
timeliness
ACM CCS
Cyber Security
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
Data Driven Security Models and Analysis
biblio
Examining Reliability of Wireless Multihop Network Routing with Linear Systems
Submitted by rudra on Wed, 09/17/2014 - 6:31pm
Control
Modeling
Wireless Sensing and Actuation
CPS Technologies
Foundations
control
CPS Technologies
foundations
Information Flow Control
modeling
multihop networks
Reliability
stochastic dynamic systems
Systems Security
wireless sensing and actuation
Information Flow Control
Systems Security
biblio
Proving Abstractions of Dynamical Systems Through Numerical Simulations
Submitted by mitras on Wed, 09/17/2014 - 6:31pm
Systems Engineering
Science of Security
Simulation
Validation and Verification
CPS Technologies
Foundations
abstraction
ACM CCS
adversary
CPS Technologies
Cryptography
cyberphysical systems
foundations
Mathematical Foundations of Cryptography
Science of Security
simulation
systems engineering
validation and verification
verification
ACM CCS
Cryptography
Mathematical Foundations of Cryptography
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
biblio
Characterizing the Power of Moving Target Defense via Cyber Epidemic Dynamics
Submitted by shouhuai on Wed, 09/17/2014 - 6:31pm
Quantitative Verification
Systems Engineering
Modeling
Science of Security
Validation and Verification
CPS Technologies
Foundations
ACM CCS
CPS Technologies
Cyber Epidemic Dynamics
Cybersecurity dynamics
epidemic threshold
foundations
modeling
moving target defense
moving-target defense
Quantitative Verification
Science of Security
security models
systems engineering
Systems Security
validation and verification
ACM CCS
Moving-Target Defense
Systems Security
« first
‹ previous
1
2
3
next ›
last »