Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ACM CCS
biblio
An Analysis of Fedora Security Profile
Submitted by vouk on Wed, 09/17/2014 - 5:32pm
Testing
Science of Security
Validation and Verification
Foundations
ACM CCS
cyber security
detection
Domain-Specific Security and Privacy Architectures
Fedora
Formal Methods and Theory of Security
foundations
Logic and Verification
Non-Operational Testing
prediction
Science of Security
security faults
Software and Application Security
testing
validation and verification
vulnerabilities
ACM CCS
Domain-Specific Security and Privacy Architectures
Cyber Security
Formal Methods and Theory of Security
Logic and Verification
Software and Application Security
biblio
Modeling and Sensing Risky User Behavior on Mobile Devices
Submitted by enck on Wed, 09/17/2014 - 5:32pm
Wireless Sensing and Actuation
Science of Security
CPS Technologies
Foundations
ACM CCS
CPS Technologies
cyber security
foundations
Human and Societal Aspects of Security and Privacy
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
mobile
Mobile and Wireless Security
network security
Science of Security
security
User behavior
wireless sensing and actuation
ACM CCS
Cyber Security
Intrusion Detection Systems
Mobile and Wireless Security
Human and Societal Aspects of Security and Privacy
Intrusion/Anomaly Detection and Malware Mitigation
Network Security
biblio
Improving Mobile Application Security via Bridging User Expectations and Application Behaviors
Submitted by xxiao007 on Wed, 09/17/2014 - 5:32pm
Control
Science of Security
Foundations
ACM CCS
control
foundations
Human and Societal Aspects of Security and Privacy
Mobile Platform Security
natural language processing
Operating systems security
Privacy Control
Science of Security
Social Aspects of Security and Privacy
Software and Application Security
Systems Security
ACM CCS
Mobile Platform Security
Social Aspects of Security and Privacy
Human and Societal Aspects of Security and Privacy
Software and Application Security
Operating Systems Security
Systems Security
biblio
Insecure Behaviors on Mobile Devices Under Stress
Submitted by enck on Wed, 09/17/2014 - 5:32pm
Science of Security
Foundations
ACM CCS
foundations
Human and Societal Aspects of Security and Privacy
information privacy
Mobile and Wireless Security
network security
Privacy Protections
Science of Security
ACM CCS
Information Privacy
Privacy Protections
Mobile and Wireless Security
Human and Societal Aspects of Security and Privacy
Network Security
biblio
Is There Value in Reasoning About Security at the Architectural Level: A Comparative Evaluation
Submitted by Heather Lucas on Wed, 09/17/2014 - 5:32pm
Science of Security
Foundations
ACM CCS
cyber security
foundations
Science of Security
Security in Hardware
ACM CCS
Cyber Security
Security in Hardware
biblio
Diversity-based Detection of Security Anomalies
Submitted by vouk on Wed, 09/17/2014 - 5:32pm
Testing
Systems Engineering
Science of Security
Validation and Verification
CPS Technologies
Foundations
ACM CCS
Attack detection
CPS Technologies
cyber security
diversity
foundations
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
redundancy in security
Science of Security
systems engineering
testing
validation and verification
web services
ACM CCS
Cyber Security
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
biblio
Access Control Policy Evolution: An Empirical Study
Submitted by Laurie Williams on Wed, 09/17/2014 - 5:32pm
Control
Science of Security
Foundations
access control policy
ACM CCS
control
Database and Storage Security
Evolution
foundations
Information Accountability and Usage Control
Science of Security
ACM CCS
Database and Storage Security
Information Accountability and Usage Control
biblio
Secure-by-construction Composable Componentry for Network Processing
Submitted by Heather Lucas on Wed, 09/17/2014 - 5:32pm
Embedded Software
Systems Engineering
Science of Security
CPS Technologies
Foundations
foundations
Tamper-Proof/Resistant Designs
systems engineering
Symmetric Cryptography and Hash Functions
stream processing
Security in Hardware
secure-by-construction
Science of Security
network processor
line-speed processor
hardware-software co-design
100 Gbps
Embedded Systems Security
embedded software
embedded hardware
Database and Storage Security
Data Anonymization and Sanitization
Cryptography
CPS Technologies
Block and Stream Ciphers
ACM CCS
ACM CCS
Cryptography
Block and Stream Ciphers
Data Anonymization and Sanitization
Embedded Systems Security
Database and Storage Security
Tamper-Proof/Resistant Designs
Security in Hardware
Symmetric Cryptography and Hash Functions
biblio
Securing Hadoop in Cloud
Submitted by vouk on Wed, 09/17/2014 - 5:32pm
Control
Science of Security
Foundations
ACM CCS
cloud
control
Cryptography
cyber security
foundations
Hadoop
key management
lack of fine-grained access control
Operating systems security
overloaded authentication key
Science of Security
security
Systems Security
Virtualization and Security
ACM CCS
Cryptography
Cyber Security
Key Management
Virtualization and Security
Operating Systems Security
Systems Security
biblio
Channel Correlation Modeling for Link Signature Security Assessment
Submitted by Huaiyu on Wed, 09/17/2014 - 5:32pm
Wireless Sensing and Actuation
Science of Security
CPS Technologies
Foundations
ACM CCS
channel correlation
CPS Technologies
cyber security
foundations
link signature
physical layer security
Science of Security
Systems Security
wireless sensing and actuation
ACM CCS
Cyber Security
Systems Security
1
2
3
4
next ›
last »