Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Attack vectors
biblio
MASCAT: Preventing Microarchitectural Attacks Before Distribution
Submitted by aekwall on Wed, 02/13/2019 - 11:00am
Scalability
cache attacks
microarchitectural attacks
static code analysis.
Resiliency
Human behavior
Attack vectors
pubcrawl
biblio
An overview of cyber-attack vectors on SCADA systems
Submitted by aekwall on Wed, 02/13/2019 - 11:00am
pubcrawl
transport protocols
TCP/IP based protocols
supervisory control and data acquisition systems
Software
security of data
security
Scalability
SCADA systems
SCADA
Resiliency
Attack vectors
Protocols
Monitoring
Industrial Control Systems
Human behavior
cyber-attack vectors
cyber-attack
critical infrastructures
critical infrastructure
Buffer overflows
biblio
An Intelligent Software defined Network Controller for preventing Distributed Denial of Service Attack
Submitted by aekwall on Wed, 02/13/2019 - 10:59am
Resiliency
machine learning based intelligent method
Naive Bayes
naive Bayes algorithm
nearest neighbour methods
network computing environment
network layer
network management mechanism
operating system
pubcrawl
machine learning algorithms
Scalability
SDN network
Software Defined Network
Software Defined Network architecture
software defined networking
support vector machine
Support vector machines
telecommunication traffic
data traffic
Attack vectors
Bayes methods
Classification algorithms
computer architecture
Computer crime
computer network management
computer network security
cyber security
Data models
Application Layer
denial of service
distributed denial of service
distributed denial of service attack
Human behavior
infected packets
intelligent software
intelligent software defined network controller
k-nearest neighbor
biblio
A Google Chromium Browser Extension for Detecting XSS Attack in HTML5 Based Websites
Submitted by grigby1 on Wed, 01/16/2019 - 1:32pm
Human behavior
XSS attack
Web sites
Web pages
Web Browser Security
tools
tags
security of data
Resiliency
pubcrawl
online front-ends
Metrics
input validation
hypermedia markup languages
Attack vectors
HTML5 based Web sites
Google Chromium browser extension
extensions
Electronic mail
cross-site scripting attack
cross-site scripting
cross document messaging
computer science
Compositionality
Browsers
Browser Security
Attributes
attribute abuse
biblio
Towards comprehensive protection for OpenFlow controllers
Submitted by grigby1 on Wed, 01/10/2018 - 11:24am
Cross Layer Security
Virtual machine monitors
telecommunication control
security
Resiliency
pubcrawl
operating systems
OpenFlow critical component
OpenFlow controller
malicious controller
Industrial Control Systems
dynamic networks
adaptive networks
cross layer diversity
control systems
control plane-data ploane decoupling
control logic
computer network security
Computer bugs
computer architecture
composability
Attack vectors
agile networks
biblio
A Feasibility Study of Autonomically Detecting In-Process Cyber-Attacks
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
Scalability
normal application behavior
off-line models
on-line models
perturbed applications
program transformation
pubcrawl
QoS requirements
quality-of-service requirements
Resiliency
Runtime
Monitoring
security
security of data
Software
software development process
software vulnerabilities
supervised training
Trusted Computing
trusted software application
unsafe actions
web applications
features extraction
application-agnostic cyber-attack detection system
Attack vectors
attacker
autonomic alert system
autonomic cyber-attack detection system
Autonomic Security
call graph
control flow
exemplar Web-based applications
feature extraction
application execution
heterogeneous software systems
in-process cyber-attacks
Instruments
Java
learning (artificial intelligence)
learning strategies
lightweight structures
machine learning techniques
Metrics
biblio
Efficient Implementation of McEliece Cryptosystem on Graphic Processing Unit
Submitted by K_Hooper on Wed, 11/01/2017 - 10:04am
Scalability
resilience
pubcrawl
openCL
McEliece Cryptosystem
Local-memory
Human behavior
gpu
Attack vectors
biblio
An In-Depth Study of More Than Ten Years of Java Exploitation
Submitted by K_Hooper on Wed, 11/01/2017 - 10:04am
Security analysis
Scalability
resilience
pubcrawl
java security
Human behavior
exploits
Attack vectors
Access Control
biblio
Operation Digital Chameleon: Towards an Open Cybersecurity Method
Submitted by K_Hooper on Wed, 11/01/2017 - 10:04am
Wargaming
Serious Gaming
Scalability
resilience
pubcrawl
open innovation
IT-Security of Critical Infrastructures
Human behavior
Cyberwargaming
Attack vectors
biblio
Experimentation Support for Cyber Security Evaluations
Submitted by K_Hooper on Wed, 11/01/2017 - 10:04am
threat assessment
Scalability
resilience
pubcrawl
modeling
Human behavior
Cyber Test Range
cyber security analysis
Attack vectors
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »