Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Science of Security VO
Home
About
Search
Calendar
Members
Contact Us
Forums
Files
CPS-VO
»
Science of Security VO
» ACM CCS
ACM CCS
event
CPS-SPC 2017
Nov 03, 2017 7:00 am - 6:00 pm CDT
Submitted by Anonymous on Mon, 07/24/2017 - 2:41pm
3rd Annual ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC)
In Conjunction with the ACM Conference on Computer and Communications Security (CCS)
CPS Domains
Energy Efficient Buildings
Energy Sector
SCADA Systems
Medical Devices
Automotive
Architectures
Architectures
Smart Grid
Avionics
Control
Energy
Modeling
Critical Infrastructure
Health Care
Resilient Systems
Robotics
Science of Security
Transportation
CPS Technologies
Foundations
2017
security
ACM CCS
biblio
An Analysis of Fedora Security Profile
Submitted by
vouk
on Wed, 09/17/2014 - 5:32pm
Testing
Science of Security
Validation and Verification
Foundations
ACM CCS
cyber security
detection
Domain-Specific Security and Privacy Architectures
Fedora
Formal Methods and Theory of Security
foundations
Logic and Verification
Non-Operational Testing
prediction
Science of Security
security faults
Software and Application Security
testing
validation and verification
vulnerabilities
Domain-Specific Security and Privacy Architectures
Cyber Security
Formal Methods and Theory of Security
Logic and Verification
ACM CCS
Software and Application Security
biblio
Modeling and Sensing Risky User Behavior on Mobile Devices
Submitted by
enck
on Wed, 09/17/2014 - 5:32pm
Wireless Sensing and Actuation
Science of Security
CPS Technologies
Foundations
ACM CCS
CPS Technologies
cyber security
foundations
Human and Societal Aspects of Security and Privacy
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
mobile
Mobile and Wireless Security
network security
Science of Security
security
User behavior
wireless sensing and actuation
Cyber Security
Intrusion Detection Systems
Mobile and Wireless Security
Human and Societal Aspects of Security and Privacy
Intrusion/Anomaly Detection and Malware Mitigation
ACM CCS
Network Security
biblio
Improving Mobile Application Security via Bridging User Expectations and Application Behaviors
Submitted by
xxiao007
on Wed, 09/17/2014 - 5:32pm
Control
Science of Security
Foundations
ACM CCS
control
foundations
Human and Societal Aspects of Security and Privacy
Mobile Platform Security
natural language processing
Operating systems security
Privacy Control
Science of Security
Social Aspects of Security and Privacy
Software and Application Security
Systems Security
Mobile Platform Security
Social Aspects of Security and Privacy
Human and Societal Aspects of Security and Privacy
ACM CCS
Software and Application Security
Operating Systems Security
Systems Security
biblio
Insecure Behaviors on Mobile Devices Under Stress
Submitted by
enck
on Wed, 09/17/2014 - 5:32pm
Science of Security
Foundations
ACM CCS
foundations
Human and Societal Aspects of Security and Privacy
information privacy
Mobile and Wireless Security
network security
Privacy Protections
Science of Security
Information Privacy
Privacy Protections
Mobile and Wireless Security
Human and Societal Aspects of Security and Privacy
ACM CCS
Network Security
biblio
Is There Value in Reasoning About Security at the Architectural Level: A Comparative Evaluation
Submitted by
Heather Lucas
on Wed, 09/17/2014 - 5:32pm
Science of Security
Foundations
ACM CCS
cyber security
foundations
Science of Security
Security in Hardware
Cyber Security
ACM CCS
Security in Hardware
biblio
Diversity-based Detection of Security Anomalies
Submitted by
vouk
on Wed, 09/17/2014 - 5:32pm
Testing
Systems Engineering
Science of Security
Validation and Verification
CPS Technologies
Foundations
ACM CCS
Attack detection
CPS Technologies
cyber security
diversity
foundations
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
redundancy in security
Science of Security
systems engineering
testing
validation and verification
web services
Cyber Security
Intrusion Detection Systems
Intrusion/Anomaly Detection and Malware Mitigation
ACM CCS
biblio
Access Control Policy Evolution: An Empirical Study
Submitted by
Laurie Williams
on Wed, 09/17/2014 - 5:32pm
Control
Science of Security
Foundations
access control policy
ACM CCS
control
Database and Storage Security
Evolution
foundations
Information Accountability and Usage Control
Science of Security
Database and Storage Security
Information Accountability and Usage Control
ACM CCS
biblio
Secure-by-construction Composable Componentry for Network Processing
Submitted by
Heather Lucas
on Wed, 09/17/2014 - 5:32pm
Embedded Software
Systems Engineering
Science of Security
CPS Technologies
Foundations
100 Gbps
ACM CCS
Block and Stream Ciphers
CPS Technologies
Cryptography
Data Anonymization and Sanitization
Database and Storage Security
embedded hardware
embedded software
Embedded Systems Security
foundations
hardware-software co-design
line-speed processor
network processor
Science of Security
secure-by-construction
Security in Hardware
stream processing
Symmetric Cryptography and Hash Functions
systems engineering
Tamper-Proof/Resistant Designs
Cryptography
Block and Stream Ciphers
Data Anonymization and Sanitization
Embedded Systems Security
Database and Storage Security
Tamper-Proof/Resistant Designs
ACM CCS
Security in Hardware
Symmetric Cryptography and Hash Functions
biblio
Securing Hadoop in Cloud
Submitted by
vouk
on Wed, 09/17/2014 - 5:32pm
Control
Science of Security
Foundations
ACM CCS
cloud
control
Cryptography
cyber security
foundations
Hadoop
key management
lack of fine-grained access control
Operating systems security
overloaded authentication key
Science of Security
security
Systems Security
Virtualization and Security
Cryptography
Cyber Security
Key Management
Virtualization and Security
ACM CCS
Operating Systems Security
Systems Security
1
2
3
4
next ›
last »