Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Complexity theory
biblio
A Seamless Secret Sharing Scheme Implementation for Securing Data in Public Cloud Storage Service
Submitted by grigby1 on Thu, 09/26/2019 - 10:42am
secret sharing
potential alternative
pubcrawl
public cloud data storage services
public cloud storage
public cloud storage service
Rabin's IDA output files
resilience
Resiliency
seamless secret sharing scheme implementation
Secret key
original file
Secure File Sharing
securing data
security
Servers
Shamir's SSA
short term
storage management
targeted file
targeting ordinary nontechnical users
Human behavior
Cloud Computing
Complexity theory
composability
Cryptography
data privacy
data security concern
defined public cloud storage services
defined service providers
file protection
free plans
authentication key
Human Factors
information dispersal
internet
local secure key-store
low-cost digital data
metadata
Metrics
nontechnical user
Organizations
biblio
The β-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation
Submitted by aekwall on Mon, 07/01/2019 - 10:12am
methodological shortcomings
β-distribution
vulnerability database
time-to-compromise metric
Threat Landscape
Security-Metric
security of data
Security Metrics
Risk-Metric
Risk-Estimation
risk management
pubcrawl
practical cyber security risk estimation
original TTC
national CERT
Metrics
complex system modeling
Measurement
mathematical shortcomings
Large-scale systems
IT-security
individual systems
estimation
cybersecurity metrics
Cyber-security
cyber threat intelligence
CVSS vectors
continuous attacker skill
computer science
Complexity theory
complex systems
biblio
Scalable Verification Framework for C Program
Submitted by grigby1 on Fri, 06/28/2019 - 10:36am
scalability issues
property-guided program slicing
pubcrawl
quality assurance
resilience
Resiliency
Safety
safety critical areas
Scalability
program verification problem
scalable verification
scalable verification framework
Software
Software systems
structural abstraction
Through-silicon vias
TSV
abstraction refinement
program verification
Program slicing
program compilers
optimization
model checking
Metrics
memory consumption
lines-of-code
extended structural abstraction
context aware software verification
Compositionality
Complexity theory
C program verifiers
C language
automatic software verification framework
biblio
Improving Network Connectivity and Robustness Using Trusted Nodes With Application to Resilient Consensus
Submitted by willirn1 on Thu, 05/30/2019 - 2:57pm
r-robustness
robust graphs
dominating sets
Complexity theory
Measurement
Redundancy
resilience
control systems
Robustness
networked system control
robust network construction
telecommunication control
fundamental metrics
failure-prone circumstances
resilient consensus
network structure
network connectivity
network robustness
structural robustness
trusted nodes
telecommunication network reliability
Vanderbilt
biblio
Property Specific Information Flow Analysis for Hardware Security Verification
Submitted by grigby1 on Mon, 05/20/2019 - 4:30pm
Scalability
Metrics
policy-based governance
potential security violations
property specific information flow analysis
property specific search
property specific trimming technique
pubcrawl
resilience
Resiliency
Mathematical model
security
security critical paths
security model
security of data
security property
security verification
timing
Trojan horses
unintended design flaws
hardware security verification
collaboration
Complexity theory
composability
Control Theory
Design methodology
formal verification
Hardware
hardware information flow analysis
Hardware Security
Acceleration
hardware security vulnerabilities
Hardware Trojans
Human behavior
Human Factors
information flow analysis
information flow models
information flow security
information theoretic security
biblio
Criminal Profiling in Digital Forensics: Assumptions, Challenges and Probable Solution
Submitted by aekwall on Wed, 05/08/2019 - 9:42am
Human behavior
tools
Stakeholders
Scalability
resilience
pubcrawl
probable solution
Metrics
investigation
Internet technologies
internet
information forensics
Complexity theory
Digital Forensics
data privacy
Cyberspace
cybercriminals
cybercrime investigations
Cybercrime
cyber-scene
cyber scene
criminal profiling
Computer crime
biblio
Mathematical Modeling of Group Authentication Based on Isogeny of Elliptic Curves
Submitted by aekwall on Wed, 05/01/2019 - 12:38pm
message authentication
Task Analysis
Scalability
Resiliency
quantum computing
public key cryptography
pubcrawl
Protocols
postquantum systems
Metrics
authentication
mathematical modeling
isogeny graphs
Isogeny
hierarchical group authentication scheme
graph theory
Elliptic curves
Elliptic curve cryptography
Complexity theory
biblio
CAPTCHA: Machine or Human Solvers? A Game-Theoretical Analysis
Submitted by aekwall on Mon, 04/01/2019 - 10:07am
CAPTCHA solvers
welfare-improving CAPTCHA business model
ubiquitous defense
traditional wisdom
open Web resources
Machine Solver
human solvers
Human Solver
Games
game-theoretical analysis
game theoretical framework
equilibrium analysis
cryptocurrency
Complexity theory
cheap labor
CAPTCHA system
security of data
bitcoins
automatic programs
CAPTCHA
captchas
computer security
Economics
Web sites
Computer crime
blockchain
composability
pubcrawl
Human behavior
game theory
Servers
biblio
Functionality and Security Co-Design Environment for Embedded Systems
Submitted by grigby1 on Thu, 02/14/2019 - 11:23am
recovery
Hardware
hardware development
intelligence surveillance and reconnaissance sensors
Lincoln asymmetric multicore processing architecture
Mission Assurance
mission functions
Multicore processing
multiprocessing systems
pubcrawl
functionality
resilience
resilient embedded system
Secure Processing
security
software development
Sophisticated Attacks
surveillance
System recovery
testbed
computer network security
Resiliency
adversarial cyber effects
anomalies detection
asymmetric multicore processing
Availability
co-design
co-design environment
command and control systems
Complexity theory
Resilient Security Architectures
critical missions
Cryptography
deliberate attacks
department of defense mission systems
DoD
electronic signal intelligence systems
electronic warfare
embedded systems
biblio
Reducing Attack Surface via Executable Transformation
Submitted by grigby1 on Fri, 02/08/2019 - 4:32pm
security
office of naval research
ONR
overwhelming emphasis
Productivity
programmers productivity
pubcrawl
resilience
Resiliency
Scalability
obscure use cases
security of data
Software
software engineering
software engineering history
software maintenance
software reusability
telecommunication security
total platform cyber protection
TPCP
individual approaches
Binary
binary transformation
Complexity theory
Conferences
constant demands
de-bloat software binaries
Debloat
deployment practices
executable transformation
attack surface
individual decisions
Late Stage Customization
Libraries
maximal code reuse
Metrics
minimal developer effort
modern software development
Navy
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »