Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ACM CCS
biblio
Building the Security Behavior Observatory: An Infrastructure for Long-term Monitoring of Client Machines
Submitted by aforget on Wed, 09/17/2014 - 5:32pm
Architectures
Architectures
ACM CCS
Architectures
CPS Technologies
cyber security
Database and Storage Security
foundations
Hardware Security Implementation
Human and Societal Aspects of Security and Privacy
Management and Querying of Encrypted Data
Science of Security
Security in Hardware
USE: User Security Behvaior
ACM CCS
Cyber Security
Database and Storage Security
Management and Querying of Encrypted Data
Hardware Security Implementation
Human and Societal Aspects of Security and Privacy
Security in Hardware
biblio
Limiting Recertification in Highly Configurable Systems: Analyzing Interactions and Isolation Among Configuration Options
Submitted by Pfeffer Juergen on Wed, 09/17/2014 - 5:32pm
Certification
Concurrency and Timing
ACM CCS
certification
composability
concurrency and timing
configuration options
cyber security
Formal Methods and Theory of Security
foundations
Logic and Verification
network analysis
Science of Security
Security Metrics
validation and verification
ACM CCS
Cyber Security
Formal Methods and Theory of Security
Logic and Verification
biblio
Personalized Password Guessing: A New Security Threat
Submitted by Zbigniew Kalbarczyk on Wed, 09/17/2014 - 5:31pm
Modeling
Science of Security
Foundations
ACM CCS
cyber security
foundations
Graphical Model
guessing
Human and Societal Aspects of Security and Privacy
modeling
password
personalized
Science of Security
suggestion
ACM CCS
Cyber Security
Human and Societal Aspects of Security and Privacy
Data Driven Security Models and Analysis
biblio
Preemptive Intrusion Detection
Submitted by Zbigniew Kalbarczyk on Wed, 09/17/2014 - 5:31pm
Systems Engineering
Modeling
Science of Security
CPS Technologies
Foundations
ACM CCS
CPS Technologies
credential stealing attack
cyber security
cyber-system
factor graph
foundations
Graphical Model
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
modeling
Science of Security
security incident
systems engineering
tagging
timeliness
ACM CCS
Cyber Security
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
Data Driven Security Models and Analysis
biblio
Trustworthy Context-dependent Services
Submitted by Heather Lucas on Wed, 09/17/2014 - 5:31pm
Resilient Systems
Science of Security
Foundations
ACM CCS
Domain-Specific Security and Privacy Architectures
foundations
Resilient Systems
Science of Security
Software and Application Security
Web Application Security
ACM CCS
Domain-Specific Security and Privacy Architectures
Web Application Security
Software and Application Security
biblio
Type-specific Languages to Fight Injection Attacks
Submitted by JonathanAldrich on Wed, 09/17/2014 - 5:31pm
Secure Control Systems
Science of Security
Foundations
ACM CCS
foundations
Science of Security
secure control systems
Software and Application Security
Web Application Security
ACM CCS
Web Application Security
Software and Application Security
biblio
Evidence-based Trust Reasoning
Submitted by jingweihuang on Wed, 09/17/2014 - 5:31pm
Modeling
Science of Security
Foundations
ACM CCS
Evidence-based trust
foundations
modeling
Operating systems security
privacy
Science of Security
Systems Security
Trust Frameworks
trust model
Trusted Computing
Trusted platforms
ACM CCS
Trusted Computing
Trusted platforms
Trust Frameworks
Operating Systems Security
Systems Security
biblio
An Analysis Method for Medical Device Security
Submitted by arnabray on Wed, 09/17/2014 - 5:31pm
CPS Domains
Medical Devices
Health Care
Science of Security
Foundations
ACM CCS
CPS Domains
cyber security
foundations
health care
medical device security
medical devices
Science of Security
Software and Application Security
Web Application Security
ACM CCS
Cyber Security
Web Application Security
Software and Application Security
biblio
InViz: Instant Visualization of Security Attacks
Submitted by llayman on Wed, 09/17/2014 - 5:31pm
Concurrency and Timing
Real-time Systems
Real-Time Coordination
Science of Security
Foundations
ACM CCS
concurrency and timing
Cyber Attacks
cyber security
Cybersecurity
foundations
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
log file
real-time analysis
Real-Time Coordination
real-time systems
Science of Security
visualization
ACM CCS
Cyber Attacks
Cyber Security
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
biblio
Emergent Behavior in Cybersecurity
Submitted by shouhuai on Wed, 09/17/2014 - 5:31pm
Science of Security
Foundations
ACM CCS
cyber security
Cybersecurity
Emergent Behavior
foundations
Human and Societal Aspects of Security and Privacy
Science of Security
Security Properties
ACM CCS
Cyber Security
Human and Societal Aspects of Security and Privacy
« first
‹ previous
1
2
3
4
next ›
last »