Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
standards
biblio
A Construction Method of Security Mechanism Requirement for Wireless Access System Based on CC Standard
Submitted by grigby1 on Tue, 01/21/2020 - 11:33am
Safety
Wireless communication
wireless access system
telecommunication security
standards
security threats
security mechanism requirement construction method
security functions
security functional components
security evaluation standard
security assurance components
Security Assurance
Security Assessment Standards
security
Scalability
collaboration
Resiliency
resilience
radio access networks
pubcrawl
policy-based governance
Metrics
information technology
Information Assurance
incomplete security mechanism
Human behavior
emergency communication network
composability
Communication system security
Communication networks
biblio
Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN
Submitted by grigby1 on Tue, 01/21/2020 - 11:27am
NFV
virtualisation
TOSCA standard
Topology
standards
software defined networking
security
SDN
Scalability
Resiliency
resilience
pubcrawl
Protocols
Performance
Peer-to-peer computing
orchestration
commodity hardware
network operators
network function virtualization
NDN-related security
NDN virtual network
NDN
named data networking
MANO
internet
information-centric networking paradigm
Information Centric Networks
Information Centric Network
content-oriented orchestration
computer network security
computer architecture
biblio
Process trees amp; service chains can serve us to mitigate zero day attacks better
Submitted by aekwall on Mon, 01/20/2020 - 12:04pm
sales team
buggy software
complete threat canvas
Computer graphics
data protection systems
Data Visualization techniques
exponential evolution
front-end sophistication domain
human computer interactions
network threats
process trees
attack sophistication
service chains
software professionals
software quality metrics
time 0.0 d
Unique Selling Proposition
user friendly applications
users
USP
zero day threats
Zero Day Attacks and Defense
cyber security
invasive software
operating system
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
standards
tools
computer security
Software
human computer interaction
Data visualization
data visualisation
software quality
operating systems (computers)
Predictive Metrics
cyber domain
Zero day attacks
application frameworks
biblio
On the Security of the PKCS\#1 V1.5 Signature Scheme
Submitted by aekwall on Mon, 01/06/2020 - 10:37am
Scalability
Resiliency
pubcrawl
standards
digital signatures
RSA
lossiness
PKCS
security reduction
biblio
A variant of the Schnorr signature using an elliptic curve over a field of characteristic two
Submitted by aekwall on Mon, 01/06/2020 - 10:37am
pubcrawl
standards
software engineering
Schnorr signature scheme
Schnorr signature
scalar multiplication
Scalability
Resiliency
public key cryptography
authentication
koblitz Curve
Elliptic curves
elliptic curve
double-and-add scalar multiplication
digital signatures
digital signature
computer science
biblio
Peer Based Tracking Using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection
Submitted by grigby1 on Thu, 01/02/2020 - 2:41pm
pubcrawl
network analytics tools
Network Behavioural detection
network traffic analysis
network traffic behaviour
Next generation firewall
next generation firewalls
packet content
peer based tracking
Peer-to-peer computing
privacy
Protocols
multituple indexing
Scalability
single tuple flow types
standard IDS systems
standards
TCP/IP fields
telecommunication traffic
traditional firewalls
transport protocols
video streaming
Zeus botnet
Intrusion Detection Systems
botnet
command and control systems
computer network security
Data Streaming
expert system rule set
expert systems
flow connection concept
generated metadata
Human Factors
Indexes
Internet of Things
5-tuple flow tables
invasive software
IoT devices
IP networks
malicious behaviours
malicious network threats
malware
malware detection
meta data
multipeered ZeuS botnet
multiple 5 tuple communications
biblio
On Composability of Game-Based Password Authenticated Key Exchange
Submitted by grigby1 on Wed, 12/11/2019 - 12:22pm
Secret key
Password Authenticated Key Exchange
PKI
practical interest
Protocols
provably secure PAKEs
pubcrawl
public key cryptography
public-key infrastructure
password
secure channels
secure composition guarantees
simulation models
standards
Symmetric Key Protocol
telecommunication security
weak forward secrecy
game-based models
Composition Theorem.
Computational modeling
Cryptographic Protocols
Cryptography
data payload encryption
find-then-guess model
FtG model
game theory
composability
game-based password authenticated key exchange protocols
game-based real-or-random definition
Games
higher-level applications
higher-level SKPs
message authentication
PAKE protocols
biblio
Formally Verified Cryptographic Web Applications in WebAssembly
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
verification
Protocols
pubcrawl
public domain software
Resiliency
Scalability
security-critical software
Servers
Signal
sophisticated custom cryptographic components
standard protocols
standards
toolchain
program verification
verification techniques
verification-oriented programming languages
verified cryptographic Web applications
verified HACL cryptographic library
verified implementation
verified-software
web-security
Webassembly
WebAssembly compilers
WebAssembly version
whatsapp
formal verification
Browsers
CoMP
compilation pipeline
compiler
compiler security
Compositionality
cryptographic code
Cryptographic Protocols
cryptographic-library
cryptographic-protocol-verification
Cryptography
authoring languages
high-assurance cryptographic libraries
high-profile attacks
instruction set
Java
JavaScript runtimes
Libraries
low-level subset
Metrics
modern Web applications
program compilers
program diagnostics
biblio
Information-Flow Preservation in Compiler Optimisations
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
Scalability
optimization
passive side-channel attacks
program optimisations
Program processors
program transformations
program verification
pubcrawl
Resiliency
optimising compilers
Semantics
side-channel
side-channel attacks
source program
standard compiler passes
standards
target program
I-O Systems
Micromechanical devices
Metrics
information-flow preserving program transformation
information-flow preservation
information-flow leaks
Information Flow
IFP
correct compilers
Compositionality
compiler security
compiler optimisations
compiler
CompCert C compiler
security
i-o systems security
biblio
What You Get is What You C: Controlling Side Effects in Mainstream C Compilers
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
language security
compiler performance
compiler upgrade
compiler writers
compilers
constant-time
CPUs
crypto code
cryptographic algorithm
cryptographic protocol security
erasing
implicit properties
compiler optimizations
LLVM
mainstream C compilers
secure code
Security Engineers
side channels
side effects
stack
timing channel
zeroing
compiler security
timing
Cryptography
Cryptographic Protocols
Program processors
Resiliency
pubcrawl
Metrics
standards
optimization
Libraries
optimisation
program verification
Scalability
Security Properties
Compositionality
program compilers
C
C abstract machine
C++ language
careful programmer
Clang
compiler commands
Compiler Optimization
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
…
next ›
last »