Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Decision support systems
biblio
Robust optimization of risk for power system based on information gap decision theory
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
power system security
uncertainty
Robustness
robust optimization operation method
robust optimization of power system
risk optimization
risk management
risk control optimization
pubcrawl170108
pubcrawl170107
power systems
Decision support systems
power system risk control
power system management
Power industry
optimization
optimisation
nonprobabilistic uncertainties
Non-probabilistic uncertainty
information gap decision theory
IEEE-30 system
decision theory
biblio
"Scalable command and control detection in log data through UF-ICF analysis"
Submitted by abfox on Tue, 02/14/2017 - 12:13pm
fixed user agent string
UF-ICF analysis
scalable command-and-control detection
pubcrawl170101
pattern clustering
normal user
networking logs
malware
log data
IP networks
IP addresses
invasive software
intrusion prevention systems
information security
information filtering
Frequency modulation
advanced persistent threat
filtering methods
domain names
Decision support systems
coverage rate
connection behaviors
computer network security
command and control systems
Command and Control (C&C)
clustering methods
C&C sites
C&C server detection
botnet
benign service
APT
antivirus software
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 2:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 2:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 2:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems
biblio
Monitoring Translation Lookahead Buffers to Detect Code Injection Attacks
Submitted by BrandonB on Thu, 04/30/2015 - 1:10pm
hackers
translation lookahead buffers monitoring
TLB
system monitoring
security
memory pages identification
legitimate code injection attack
invasive software
Handheld computers
blocks malicious injected code activation
external I/O operations
Decision support systems
data execution prevention
Computer crime
code injection attack detection
Code injection
Buffer storage
biblio
State of the Art: Automated Black-Box Web Application Vulnerability Testing
Submitted by rvmeush on Fri, 09/26/2014 - 12:04pm
Automatic testing
Code standards
Computer hacking
Credit cards
Cross Site Scripting
Data Security
Decision support systems
Forgery
Personnel
privacy
Probes
SQL injection
SQLI
XSS
« first
‹ previous
1
2
3
4