Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Communities
biblio
The Honey Community: Use of Combined Organizational Data for Community Protection
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
Honey Pot
would-be attackers
US military infrastructure
US CYBERCOM
United States
security of data
security
pubcrawl170114
Ports (Computers)
organisational aspects
multiorganization concept
Monitoring
honeypots
honeynets
Cities and towns
honey net
honey community
Government
geographic boundary
fictitious community
DHS
Cyberdefense
cyber frontier
critical infrastructures
critical cyber infrastructure
community protection
Communities
combined organizational data
biblio
Identify Visual Human Signature in community via wearable camera
Submitted by grigby1 on Wed, 03/08/2017 - 1:14pm
pubcrawl170113
weighted voting fusion
Weighted Voting
Wearable devices
Wearable Device
wearable computers
wearable camera
visualization
visual patches
visual human signature
VHS recognition
sensor fusion
security of data
Robustness
Cameras
multiview celebrity identity dataset
MCID
information sharing
image recognition
Human Attributes
feature extraction
facial attributes
facial appearance
Face
Databases
Communities
clothing attributes
Clothing
biblio
Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops
Submitted by grigby1 on Tue, 03/07/2017 - 12:43pm
hacker Web
Web sites
vulnerabilities
threats
threat identification
Servers
pubcrawl170109
online hacker communities
machine learning methodology
learning (artificial intelligence)
IRC channels
information retrieval techniques
information retrieval
carding shops
Hacker IRC
hacker forums
Cybersecurity
cybercriminals
cyber threat detection
cyber security
cyber defenses
Credit cards
Computer hacking
Computer crime
Communities
biblio
"Applying Formal Methods to Networking: Theory, Techniques, and Applications"
Submitted by grigby1 on Tue, 02/21/2017 - 11:11am
Internet community
Tutorials
software defined networking
Software
SDN
pubcrawl170103
Protocols
networking protocols
network infrastructure
Mathematics
Internet culture
applying formal methods
Internet architecture
internet
formal verification
formal specifications
formal correctness
Computers
computer networks
Communities
clean slate Internet design
biblio
A Credential Store for Multi-tenant Science Gateways
Submitted by BrandonB on Wed, 05/06/2015 - 1:11pm
middleware tier
user interfacing tier
user interfaces
Servers
security
Science Gateways
resource tier
Portals
overlay cyber infrastructure
OA4MP
multitenant science gateways
Apache Airavata
middleware
Logic gates
grid computing
gateway middleware
credential store
computational grids
Communities
clouds
Cloud Computing
authentication
biblio
Key Management for Cloud Data Storage: Methods and Comparisons
Submitted by BrandonB on Wed, 05/06/2015 - 12:40pm
Memory
symmetric key cryptography algorithms
symmetric key
storage management
Servers
sensitive information protection
Public key
public cloud
potential intruders
outsourced cloud
Organizations
onsite cloud
applications
key management
encryption key management
decryption key management
Data Security
Cryptography
Communities
cloud service provider
cloud scenarios
cloud data storage
cloud computing paradigm
Cloud Computing
biblio
Probabilistic Threat Propagation for Network Security
Submitted by BrandonB on Wed, 05/06/2015 - 9:33am
infected nodes
Upper bound
threat probabilities
security
probability
probabilistic threat propagation
Probabilistic logic
Peer-to-peer computing
network security analysis
network security
network hosts
monitored networks
malicious Web destinations
malicious nodes
internet
Blacklist
graphical modeling work
graph theory
graph analytics world
graph algorithms
forensic analysis
external Internet
Digital Forensics
cyclic propagation
computer network security
community detection
Communities
Communication networks
Botnets detection
botnet
biblio
Enabling Collaborative Research for Security and Resiliency of Energy Cyber Physical Systems
Submitted by BrandonB on Tue, 05/05/2015 - 11:09am
energy cyber physical systems
wide-area situational awareness experiment
security of data
power systems
power grids
Power Grid
power engineering computing
Phasor measurement units
fault tolerant computing
Experimentation
collaboration
Energy
Data models
cyber physical systems
cyber physical system security
cyber physical system resiliency
computer security
Communities
collaborative research
biblio
Soft systems methodology in net-centric cyber defence system development
Submitted by BrandonB on Tue, 05/05/2015 - 11:09am
modeling
system dynamics model
System Dynamics
system behaviour
SSM
soft systems methodology
sociotechnical systems
situational awareness
security of data
SA
net-centric information system
net-centric hypothesis
net-centric cyber defence system development
net-centric approach
Net-Centric
collaboration
interdependent dynamic relationships
information value
Information systems
information sharing community
information security
information reach
information environment
human activity system
Distributed Information Systems
data sources
complexity
Communities
command and control
collaborative communities
biblio
A survey of Internet security risk over social networks
Submitted by BrandonB on Tue, 05/05/2015 - 10:55am
Internet security risk
social risks
social networks
social networking integration
social networking (online)
Social network services
social network
security of data
security
rural community
risk management
Organizations
civil society
Internet risks
internet
hackers
global economy
geography climate
Educational institutions
dangers to society
crimes social networking
Computers
Communities
1
2
3
next ›
last »