Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
standards
biblio
Secure Compilation and Hyperproperty Preservation
Submitted by grigby1 on Wed, 01/10/2018 - 12:19pm
Safety
untyped target language
typed source language
Type theory
trace-preserving compilation
TPC
Syntactics
standards
Semantics
Security Properties
security of data
security
secure compilers
secure compilation
safety hyperproperties
coding theory
Resiliency
pubcrawl
program verification
Program processors
program compilers
low-level attack capabilities
hyperproperty preservation
fully abstract compiler
correctness criterion
Concrete
composability
compiler security
compiled program
biblio
Towards provisioning of SDN/NFV-based security enablers for integrated protection of IoT systems
Submitted by grigby1 on Thu, 12/28/2017 - 1:40pm
Monitoring
Virtualization
standards
software defined networking
security scalability
SDN/NFV-based security features
Scalability
pubcrawl
open-source SDN/NFV projects
authentication
low-cost end-user devices
IoT
Internet of Things
cybersecurity attacks
Conferences
computer network security
Cloud Computing
biblio
Cross-Project Defect Prediction Using a Credibility Theory Based Naive Bayes Classifier
Submitted by grigby1 on Thu, 12/28/2017 - 1:30pm
predictive security metrics
transfer learning
Training data
Training
target projects
target data distribution
standards
source projects
software quality
software engineering
Software
quality assurance
pubcrawl
program debugging
Bayes methods
Predictive models
Predictive Metrics
pattern classification
novel reweighting mechanism
Nai¨ve Bayes classifier
Metrics
Insurance
cross-project defect prediction
credibility theory based naive Bayes classifier
credibility theory
CPDP
computer science
biblio
Mixed chaotic maps based encryption for high crypto secrecy
Submitted by grigby1 on Wed, 12/27/2017 - 1:09pm
Logistics
Transposition
Substitution
statistical analysis
standards
simple chaotic maps
secure image encryption techniques
secure image encryption
Resiliency
pubcrawl
mixed chaotic maps
Metrics
chaos
initial conditions
Image Processing
high crypto secrecy
encryption
Elliptic curve cryptography
Cryptography
cryptographic algorithms
composability
chaotic cryptography
chaotic communication
chaos based image encryption technique
biblio
TLS Connection Validation by Web Browsers: Why do Web Browsers Still Not Agree?
Submitted by K_Hooper on Wed, 12/20/2017 - 11:33am
security of data
X.509 certificates
X.509 Certificate
Web users
Web servers
Web browser validation process
Web Browser Security
Web browsers
Web browser behaviour
TLS connection validation
standards
Browsers
Resiliency
Public key
pubcrawl
Protocols
online front-ends
Metrics
IP networks
Human behavior
Certificate Validation
biblio
Columbus: Filesystem Tree Introspection for Software Discovery
Submitted by grigby1 on Tue, 12/12/2017 - 1:19pm
Metadata Discovery Problem
tools
standards
software packaging knowledge
software packages
software management
software engineering
software discovery
Scalability
Resiliency
querying package management tools
pubcrawl
program diagnostics
problem diagnosis
Packaging
Operational analytics
agile development practices
metadata
meta data
machine learning methods
licensing requirement compliance
learning (artificial intelligence)
filesystem tree introspection
file metadata
feature extraction
drift detection situations
Docker Images
data structures
Compositionality
Columbus
Cloud Computing
cloud
biblio
Providing advanced security mechanism for scalable data sharing in cloud storage
Submitted by grigby1 on Fri, 11/03/2017 - 11:30am
public key cryptography
trees (mathematics)
tree structure
standards
smart cards
Smart card
single key file encryption
Servers
security of data
secret key aggregation
Scalable Security
scalable data sharing
Scalability
public-key cryptosystems
advanced security mechanism
public key crypto system
pubcrawl
KAC
encryption
decryption right allocation
data handling
cloud storage
Cloud Computing
Ciphers
cipher texts
cipher text
Aggregates
biblio
A flexible system-on-a-chip implementation of the Advanced Encryption Standard
Submitted by grigby1 on Thu, 04/20/2017 - 12:41pm
network on chip
Xilinx Zynq 7000
system-on-chip
System-on-a-chip
symmetric encryption
standards
security
Scalability
resource usage
Resiliency
Registers
pubcrawl
processor
peripheral interfaces
network security
network on chip security
advanced encryption standard
hardware-software approach
flexible system-on-a-chip
flexible interface
field programmable gate arrays
encryption algorithm
encryption
Cryptography
composability
complex electronic systems
Clocks
cipher block chaining mode
CBC
AES
advanced peripheral bus
biblio
Effect of data size on performance of free-text keystroke authentication
Submitted by grigby1 on Wed, 03/08/2017 - 2:47pm
imposter pass rate
testing
test sample size
standards
reference profile size
public datasets
pubcrawl170115
physiological traits
keystroke data
Keyboards
IPR
intellectual property
authentication
free-text keystroke authentication
FAR
false alarm rate
Distance measurement
Databases
data size
biometrics (access control)
bioinformatics
behavioral biometric
authorisation
authentication performance
biblio
Enhanced recognition of keystroke dynamics using Gaussian mixture models
Submitted by grigby1 on Wed, 03/08/2017 - 2:45pm
Gaussian mixture model
standards
pubcrawl170115
outlier detection
mixture models
machine learning methods
learning (artificial intelligence)
keystroke dynamics
keystroke data
image recognition
image enhancement
human computer interaction
GMM
Gaussian processes
Gaussian Mixture Models
authentication
gaussian distribution
Gaussian density estimator
feature extraction
error statistics
equal error rate
enhanced recognition
EER
directed graphs
digraph patterns
Cryptographic Protocols
computer authentication
biometrics (access control)
biometrics
« first
‹ previous
…
24
25
26
27
28
29
30
31
32
next ›
last »