Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Science of Security
biblio
Comprehensive VM Protection Against Untrusted Hypervisor Through Retrofitted AMD Memory Encryption
Submitted by grigby1 on Mon, 11/02/2020 - 10:40am
encryption
Hardware
Memory management
pubcrawl
Science of Security
Virtual machine monitors
Virtualization
biblio
Bridging The Gap: Data Exfiltration In Highly Secured Environments Using Bluetooth IoTs
Submitted by grigby1 on Fri, 08/07/2020 - 2:38pm
air gapped network
Bluetooth
Bluetooth IoT
Bluetooth smart bulb
botnets
Browsers
computer network security
Cryptography
Data Exfiltration
free-space optical communication
highly secured network
home networks
Image color analysis
insecure IoT
Internet of Things
invasive software
IoT
IoT devices
malicious actor
Payloads
professional networks
pubcrawl
Science of Security
security
security measures
security standard
sensitive environments
sensitive information
Software
strict security policies
unprecedented threats
biblio
Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs
Submitted by FengjunLi on Thu, 07/09/2020 - 1:03am
Science of Security
2019: October
Cloud-Assisted IoT Systems Privacy
KU
Resilient Architectures
Science of Security
Resilient Architectures
KU
Cloud-Assisted IoT Systems Privacy
2019: October
biblio
Leakage Resilient Searchable Symmetric Encryption with Periodic Updation
Submitted by grigby1 on Wed, 03/18/2020 - 11:14am
Cloud Computing
encryption
Indexes
Protocols
pubcrawl
Science of Security
Servers
biblio
SDN Enabled Secure IoT Architecture
Submitted by grigby1 on Wed, 03/18/2020 - 10:59am
authentication
computer architecture
control systems
Internet of Things
Logic gates
Protocols
pubcrawl
Science of Security
biblio
HackerNets: Visualizing Media Conversations on Internet of Things, Big Data, and Cybersecurity
Submitted by grigby1 on Wed, 03/18/2020 - 10:52am
Internet of Things
Scalability
computer security
Big Data
computer science
Cybersecurity
Data visualization
interactive visualization
Media User Network
Social Media Mining
Social network services
Venn Diagram
pubcrawl
composability
collaboration
Policy-Governed Secure Collaboration
Metrics
Resiliency
resilience
Human behavior
Science of Security
biblio
Incentive Contract for Cybersecurity Information Sharing Considering Monitoring Signals
Submitted by grigby1 on Wed, 03/18/2020 - 10:51am
security of data
Monitoring
risk management
Scalability
computer security
contracts
Cyber Insurance
cyber risk transfer
cybersecurity information haring
cybersecurity information sharing
Environment monitoring
ethics
incentive contract
Incentive mechanism
Incentive Model
information management
information sharing output
Insurance
monitoring signals
Moral Hazard
pubcrawl
composability
collaboration
Policy-Governed Secure Collaboration
Metrics
Resiliency
resilience
Human behavior
Science of Security
biblio
A Self-Attention-Based Approach for Named Entity Recognition in Cybersecurity
Submitted by grigby1 on Wed, 03/18/2020 - 10:51am
Scalability
computer security
Cybersecurity
BiLSTM
Context modeling
CRF
entity recognition
feature extraction
Hidden Markov models
Labeling
machine learning
Self-Attention mechanism
pubcrawl
composability
collaboration
Policy-Governed Secure Collaboration
Metrics
Resiliency
resilience
Human behavior
Science of Security
biblio
Initial Validation of the Cybersecurity Concept Inventory: Pilot Testing and Expert Review
Submitted by grigby1 on Wed, 03/18/2020 - 10:51am
Scalability
computer security
education
tools
assessment validation.
Cats
Cybersecurity Assessment Tools (CATS) Project
Cybersecurity Concept Inventory (CCI)
cybersecurity education
Instruments
Interviews
Reliability
pubcrawl
composability
collaboration
Policy-Governed Secure Collaboration
Metrics
Resiliency
resilience
Human behavior
Science of Security
biblio
Solving Cybersecurity Problem by Symmetric Dual-Space Formulation—Physical and Cybernetic
Submitted by grigby1 on Wed, 03/18/2020 - 10:51am
security of data
Scalability
computer security
Cybersecurity
5G mobile
5G mobile communication
Broadband antennas
cybersecurity problem
Electromagnetics
electronic warfare
Fourier transform
Fourier transforms
Maxwell Equation
Maxwell equations
symmetric dual-space
symmetric dual-space formulation
symmetric dual-system
symmetric Maxwell Equation
Wireless communication
pubcrawl
composability
collaboration
Policy-Governed Secure Collaboration
Metrics
Resiliency
resilience
Human behavior
Science of Security
1
2
3
4
5
6
7
8
9
…
next ›
last »