Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
proactive security
biblio
Capture the RAT: Proximity-Based Attacks in 5G Using the Routine Activity Theory
Submitted by
grigby1
on Wed, 03/06/2019 - 3:24pm
5G cellular networks
5G devices
5G environments
5G mobile communication
5G security
Analytical models
Autonomic Security
autonomous vehicles
capillary network
Cellular networks
cellular radio
composability
CRAT
critical IoT devices
Device-to-device communication
Hardware
high-level approach
OMNET++
proactive security
proximity-based attack analysis
proximity-based cybercrime
pubcrawl
RAT
reactive solutions
resilience
Resiliency
routine activity theory
security
Security analysis
security problems
security software developers
Software
telecommunication security
biblio
Predicting Impending Exposure to Malicious Content from User Behavior
Submitted by
aekwall
on Wed, 01/16/2019 - 1:07pm
pubcrawl
Metrics
Resiliency
composability
exposure prediction
network security
proactive security
Windows Operating System Security
biblio
CAre: Certificate Authority Rescue Engine for Proactive Security
Submitted by
grigby1
on Thu, 06/07/2018 - 2:14pm
Browsers
CAre
centralized system
certificate authorities
certificate authority
Certificate Authority Rescue Engine
certification
Cryptography
Data Security
digital signatures
encryption
Human behavior
internet
Metrics
online front-ends
proactive security
pubcrawl
Public key
public key cryptography
public key infrastructure
resilience
Resiliency
Scalability
SSL technology
SSL Trust Models
web security
Web servers
Web site security
biblio
From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty
Submitted by
grigby1
on Mon, 11/20/2017 - 11:25am
Access Control
Adaptation models
Computational modeling
Context
collaboration
Context modeling
context-aware computing
Context-aware security
context-aware security policy management
Governance
Government
mathematical optimization
Mobile handsets
Policy
policy-based governance
proactive security
pubcrawl
reactionary security
security economics
security of data
security policies
security policy planning
stochastic programming
stochastic programming models
ubiquitous computing
biblio
Brief Announcement: Proactive Secret Sharing with a Dishonest Majority
Submitted by
grigby1
on Tue, 05/30/2017 - 12:12pm
composability
dishonest majority
Metrics
non-robust secret sharing
proac- tive secret sharing
proactive security
pubcrawl
Resiliency
secret sharing
windows operating systems security
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by
BrandonB
on Wed, 05/06/2015 - 1:11pm
adaptive security
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
data integrity
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
network storage architecture
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
security of data
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by
BrandonB
on Thu, 04/30/2015 - 1:38pm
adaptive security
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
data integrity
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
network storage architecture
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
security of data
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization