Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computers
biblio
Analysis of network address shuffling as a moving target defense
Submitted by BrandonB on Tue, 05/05/2015 - 10:13am
Computational modeling
Computers
Information systems
IP networks
moving target defense
network address remapping
network address shuffling
probabilistic models
probability
Probes
Reconnaissance
security of data
biblio
Effectiveness of Port Hopping as a Moving Target Defense
Submitted by BrandonB on Tue, 05/05/2015 - 10:12am
Analytical models
attacker success likelihood
Computers
moving target defense
network attacks
port hopping
Ports (Computers)
proactive defense
proactive defense technology
Probes
Reconnaissance
reconnaissance attack
security of data
Servers
service identity hiding
urn model
biblio
Improved CSRFGuard for CSRF attacks defense on Java EE platform
Submitted by BrandonB on Tue, 05/05/2015 - 9:45am
Java
XSS
Welding
Servlet filter
security of data
security
script tags
JavaScript event delegation mechanism
Java EE platform
Java EE
Browsers
HTML
Event Delegation
custom response wrapper
CSRFGuard
CSRF attack defense
cross-site scripting
cross-site request forgery attack
cross-site request forgery
Computers
biblio
OpenSSL HeartBleed: Security Management of Implements of Basic Protocols
Submitted by BrandonB on Tue, 05/05/2015 - 9:14am
information security management
software facilities
Software
security threats
secure socket layer
Protocols
OpenSSL security
OpenSSL HeartBleed
information technology
Computers
information security
hierarchical structure
Heart beat
hardware facilities
Hardware
Cryptographic Protocols
cross-layer security management
biblio
Applying Formal Methods to Networking: Theory, Techniques, and Applications
Submitted by BrandonB on Tue, 05/05/2015 - 8:53am
Internet community
Tutorials
software defined networking
Software
SDN
Protocols
networking protocols
network infrastructure
Mathematics
Internet culture
applying formal methods
Internet architecture
internet
formal verification
formal specifications
formal correctness
Computers
computer networks
Communities
clean slate Internet design
biblio
RRE: A Game-Theoretic Intrusion Response and Recovery Engine
Submitted by BrandonB on Tue, 05/05/2015 - 8:13am
RRE
Markov processes
network level game-theoretic response selection engine
network security property
network-level multiobjective response selection
network-level security metric values
networked computing systems
nonlinear inference
optimal network-level response actions
partially observable competitive Markov decision process
lower level attack consequences
security
Snort alerts
stochastic games
Subspace constraints
system-level security events
trees (mathematics)
two-player Stackelberg stochastic game
uncertainty
fuzzy logic theory
attack-response trees
automated response techniques
Boolean functions
Boolean logic
computer network security
Computers
decision theory
detection algorithms
Engines
ART
fuzzy rule set
fuzzy set theory
fuzzy system
game-theoretic intrusion response and recovery engine strategy
game-theoretic optimization process
Games
Intrusion Detection
Intrusion response systems
biblio
Remote Login Password Authentication Scheme Based on Cuboid Using Biometric
Submitted by BrandonB on Tue, 05/05/2015 - 7:49am
Cuboid
system security
smart cards
Smart card
Servers
remote login password authentication scheme
password
One way function
Fingerprint recognition
cuboid diagonal
3-D geometry
Computers
computational geometry
Bismuth
biometrics (access control)
biometric value
authorisation
authentication
3D environment
biblio
A Group File Encryption Method using Dynamic System Environment Key
Submitted by BrandonB on Tue, 05/05/2015 - 7:38am
dynamic system environment key
system environment key
Servers
security level
security
message authentication
group file encryption
GEMS
file organisation
encryption
eavesdropping attack
auditing security scheme
DRM
decryption method
Cryptography
Computers
Cloud Computing
business data processing
autocrypt
authorization
authorisation
authentication
biblio
Enhanced framework for verifying user authorization and data correctness using token management system in the cloud
Submitted by BrandonB on Mon, 05/04/2015 - 1:53pm
directory services
virtual shared servers
user authorization
token management system
token granting
Servers
security as a service
mutual authentication
internet
Educational institutions
Access Control
Databases
data correctness
Computers
cloud service
Cloud Computing
authorisation
authentication
access rights
biblio
Implementation of security framework for multiple web applications
Submitted by BrandonB on Mon, 05/04/2015 - 1:51pm
MD5
web services
web applications
single sign-on
Servers
security of data
security framework implementation
proxy signature
OpenID
authentication
Informatics
identity management technique
identity management system
encryption
credential problems
Computers
authorization
authentication server
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
next ›
last »