Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Compositionality
biblio
CC-Guard: An IPv6 Covert Channel Detection Method Based on Field Matching
Submitted by grigby1 on Fri, 05/19/2023 - 2:25pm
covert channel detection
IPv6 protocol
IPv6 network security
field matching
covert channel construction
codes
Resiliency
Current measurement
covert channels
security
Firewalls (computing)
resilience
Compositionality
real-time systems
Protocols
Scalability
pubcrawl
Intrusion Detection
biblio
A Wireless Covert Communication System: Antenna Coding and Achievable Rate Analysis
Submitted by grigby1 on Fri, 05/19/2023 - 2:25pm
covert communication
antenna coding
achievable rate
codes
Resiliency
quadrature amplitude modulation
Wireless communication
transmitting antennas
Bit error rate
covert channels
security
simulation
wireless networks
resilience
Compositionality
Receivers
information security
Scalability
pubcrawl
biblio
A Network-based IoT Covert Channel
Submitted by grigby1 on Fri, 05/19/2023 - 2:25pm
Compositionality
TCP/IP
Resiliency
Zigbee
covert channels
covert channel
TCPIP
covert timing channel
resilience
Internet of Things
Bandwidth
encoding
web services
Scalability
Throughput
pubcrawl
security
biblio
Discussion on the Ways of Constructing Computer Network Security in Colleges: Considering Complex Worm Networks
Submitted by grigby1 on Fri, 04/28/2023 - 4:01pm
complex networks
Complex Worm Networks
Colleges and Universities
Application software
policy governance
Resiliency
Buffer overflows
computer network security
computer theory
computer networks
Compositionality
collaboration
composability
Computational modeling
Analytical models
Software
resilience
Metrics
Human behavior
pubcrawl
security
feature extraction
biblio
Pay or Not Pay? A Game-Theoretical Analysis of Ransomware Interactions Considering a Defender’s Deception Architecture
Submitted by grigby1 on Fri, 04/28/2023 - 4:01pm
computer security
advanced persistent threats (apt)
Cyber-security
policy governance
Minimization
Resiliency
computer theory
game theory
Ransomware
Compositionality
computer architecture
composability
Cryptography
resilience
Metrics
Human behavior
pubcrawl
security
collaboration
biblio
Research on Enterprise Information Security Risk Assessment System Based on Bayesian Neural Network
Submitted by grigby1 on Fri, 04/28/2023 - 4:00pm
Data models
fuzzy theory
Bayesian Regularization
policy governance
Resiliency
computer theory
risk assessment
Stability criteria
simulation
Compositionality
composability
Training
resilience
Metrics
Human behavior
pubcrawl
Neural networks
security
Organizations
information security
collaboration
biblio
A Game Theory based Attacker Defender Model for IDS in Cloud Security
Submitted by grigby1 on Fri, 04/28/2023 - 4:00pm
game theory
Whales
simulation
security
Resiliency
resilience
pubcrawl
policy governance
optimization
Neural networks
Metrics
Human behavior
IDS
estimation
Deep Neural Network
deep learning
computer theory
Computational modeling
Compositionality
composability
collaboration
cloud computing security
Cloud Computing
CICIDS-2018 dataset
biblio
Security and Privacy
Submitted by grigby1 on Fri, 04/28/2023 - 4:00pm
security controls
SDN/NFV
mMTC
cyber risk assessment and management
5G Cybersecurity
computer network reliability
policy governance
URLLC
Resiliency
computer theory
threat scenarios
cyber-attacks
Reliability
network function virtualization
defense
computer architecture
mitigation
Compositionality
Complexity theory
Data protection
composability
5G mobile communication
resilience
Metrics
Human behavior
pubcrawl
security
risk management
collaboration
privacy
biblio
Analyzing Initial Design Theory Components for Developing Information Security Laboratories
Submitted by grigby1 on Fri, 04/28/2023 - 3:59pm
Cryptography
infosec lab
design Theory
action design research
policy governance
Resiliency
computer theory
Laboratories
Compositionality
composability
Training
privacy
resilience
Metrics
Human behavior
pubcrawl
security
information security
collaboration
biblio
Research on Network Confrontation Information Security Protection System under Computer Deep Learning
Submitted by grigby1 on Fri, 04/28/2023 - 3:59pm
Computational modeling
network confrontation
policy governance
computer
Resiliency
data science
object detection
computer theory
Compositionality
composability
Adaptation models
resilience
Metrics
Human behavior
pubcrawl
security
information security
collaboration
Training
deep learning
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »