Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
IT industry
biblio
Restricting Data Flows to Secure Against Remote Attack
Submitted by grigby1 on Mon, 01/25/2021 - 10:29am
Air gaps
air-gapped networks
composability
critical infrastructure
Data Diode
data flows
fully securing networks
highly secure systems
Human behavior
Human Factors
IEEE compliant PMU data streams
Interiority
IT industry
Metrics
network security
one-way flows
one-way networks
pubcrawl
remote attacks
resilience
Resiliency
SDN
SDN techniques
security
security of data
software defined networking
Software Defined Node
unidirectional security
biblio
Cloud security ecosystem for data security and privacy
Submitted by grigby1 on Thu, 02/15/2018 - 10:49am
authentication
cloud adoption
Cloud Computing
Cloud Security
cloud security ecosystem
cloud service providers
CloudSim
CloudSim simulator
Cryptography
CSP
data privacy
Data Security
Ecosystems
encryption
HCS
Human behavior
human factor
Human Factors
hybrid cryptographic system
IT industry
Metrics
multifactor authentication
pubcrawl
resilience
Resiliency
biblio
Understanding botclouds from a system perspective: A principal component analysis
Submitted by BrandonB on Wed, 05/06/2015 - 9:26am
attack-as-a-service delivery model
botclouds
Cloud Computing
Computer crime
computer network security
Context
Correlation
DDoS Attacks
invasive software
IT industry
Measurement
principal component analysis
state-of-the-art botnets detection
Storms
TCP-flood
transport protocols
UDP-storm
biblio
A New Code Obfuscation Scheme for Software Protection
Submitted by BrandonB on Fri, 05/01/2015 - 6:57am
Cloning
code fragment cloning
code obfuscation scheme
code patterns
code transformation
Complexity theory
Computer crime
Data processing
IT industry
Licenses
malicious reverse engineering
nontrivial code clones
Resistance
Resists
reverse engineering
security attacks
Software
software engineering
software protection
systems re-engineering
tampering
biblio
Understanding botclouds from a system perspective: A principal component analysis
Submitted by BrandonB on Thu, 04/30/2015 - 12:21pm
attack-as-a-service delivery model
botclouds
Cloud Computing
Computer crime
computer network security
Context
Correlation
DDoS Attacks
invasive software
IT industry
Measurement
principal component analysis
state-of-the-art botnets detection
Storms
TCP-flood
transport protocols
UDP-storm