Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Jan'15
biblio
Moving Target Defense for Hardening the Security of the Power System State Estimation
Submitted by drwright on Sun, 01/11/2015 - 4:54pm
Automated Synthesis of Resilient Architectures
false data injection attack
Jan'15
moving target defense
NCSU
Power Grid
Resilient Architectures
state estimation
Resilient Architectures
NCSU
Automated Synthesis of Resilient Architectures
Jan'15
biblio
A survey of common security vulnerabilities and corresponding countermeasures for SaaS
Submitted by drwright on Sun, 01/11/2015 - 4:27pm
Jan'15
NCSU
Resilience Requirements, Design, and Testing
Resilient Architectures
Resilient Architectures
NCSU
Resilience Requirements, Design, and Testing
Jan'15
biblio
One Phish, Two Phish, How to Avoid the Internet Phish: Analysis of Training Strategies to Detect Phishing Emails
Submitted by drwright on Sun, 01/11/2015 - 4:09pm
Human behavior
Jan'15
NCSU
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
Human Behavior
NCSU
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators & Reducing Vuln.
Jan'15
biblio
SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention Systems via Offloading
Submitted by drwright on Sun, 01/11/2015 - 3:41pm
Jan'15
NCSU
Redundancy for Network Intrusion Prevention Systems (NIPS)
Resilient Architectures
biblio
Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed
Submitted by tdumitra on Fri, 01/09/2015 - 9:39pm
Human behavior
Human Behavior and Cyber Vulnerabilities
Jan'15
Metrics
UMD
biblio
SharkFin: Spatio-temporal mining of software adoption and penetration
Submitted by tdumitra on Fri, 01/09/2015 - 9:35pm
data analysis
Empirical Models for Vulnerability Exploits
Internet security
Jan'15
Malware propagation
Metrics
UMD
Metrics
UMD
Empirical Models for Vulnerability Exploits
UMD PROJECTS:
Jan'15
Empirical Models for Vulnerability Exploits
biblio
Cupid: Commitments in Relational Algebra
Submitted by mpsingh on Thu, 01/08/2015 - 8:24pm
Formal Specification and Analysis of Security-Critical Norms and Policies
Jan'15
NCSU
Policy-Governed Secure Collaboration
Scalability and Composability
Scalability and Composability
Policy-Governed Secure Collaboration
NCSU
Formal Specification and Analysis of Security-Critical Norms and Policies
Jan'15
« first
‹ previous
1
2