Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Engines
biblio
A Business Card Reader Application for iOS devices based on Tesseract
Submitted by aekwall on Mon, 07/27/2020 - 12:21pm
online repository
55 digital business cards
BCR application
commercial business card reader application
data detection
high-resolution smartphone camera
Image Processing
iOS devices
mobile phones
ios
open-source OCR engine
optical character recognition
Tesseract
Tesseract OCR
text detection
Text recognition
iOS Security
mobile computing
iOS (operating system)
natural language processing
Compositionality
Human Factors
Engines
Cameras
Optical character recognition software
character recognition
public domain software
smart phones
Business
Metrics
pubcrawl
Resiliency
feature extraction
biblio
Hardening the Core: Understanding and Detection of XNU Kernel Vulnerabilities
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
Compositionality
iOS Security
XNU kernel vulnerability
XNU kernel vulnerabilities
macOS/iOS kernel XNU
KInspector framework
feedback-based fuzzing techniques
feedback based fuzzing
common application vulnerabilities
statistical analysis
Manuals
operating system kernels
fuzzing
security of data
empirical study
Instruments
Human Factors
Engines
security vulnerabilities
vulnerability detection
Metrics
pubcrawl
Resiliency
Kernel
security
biblio
Designing Attacks Against Automotive Control Area Network Bus and Electronic Control Units
Submitted by aekwall on Mon, 07/20/2020 - 10:42am
Intelligent Transportation Systems
Vehicular security
Plugs
low cost CAN probe
electronic control units
defined analysis tools
controller area networks
car generation
CAN bus attacks
Brakes
autonomous vehicles
automotive control area network bus
attack scenarios
connected vehicles
automobiles
automotive electronics
controller area network security
Payloads
Engines
Probes
security protocols
pubcrawl
Resiliency
cyber-physical systems
Cryptographic Protocols
security
Internet of Things
biblio
Dynamic Threshold Design Based on Kalman Filter in Multiple Fault Diagnosis
Submitted by aekwall on Mon, 05/18/2020 - 10:48am
aircraft engine
uncertain systems
time domain response range calculation formula
state space equation
sensitivity requirements
Kalman filter
isolation systems
dynamic threshold range changes
dynamic threshold design
dynamic threshold algorithm
dynamic threshold
diagnosis system
current methods
constant threshold
bounded norm uncertainty
aircraft engine fault detection
Resiliency
aerospace engines
multiple fault diagnosis
fault diagnosis
Eigenvalues and eigenfunctions
Kalman filters
Time factors
Human Factors
Engines
cyber physical systems
uncertainty
Mathematical model
Robustness
robust control
Metrics
pubcrawl
biblio
Using Safety Properties to Generate Vulnerability Patches
Submitted by aekwall on Mon, 04/20/2020 - 10:45am
relational databases
vulnerability-specific safety properties
source code patches
Software-Vulnerability
Software-Patch
safety-property
safety property
property-based APR
Program-Analysis
Buffer storage
automatic program repair methods
Automated-Program-Repair
relational database security
program debugging
Engines
Safety
program verification
program diagnostics
software maintenance
security vulnerabilities
Libraries
tools
Metrics
composability
pubcrawl
Human behavior
Resiliency
Software
security
security of data
biblio
STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming
Submitted by grigby1 on Mon, 03/23/2020 - 3:58pm
ROP chain
Just-in-Time
just-in-time gadget search
low-level DOP data structures
Manuals
memory corruption vulnerabilities
object-oriented programming
online front-ends
Payloads
pointer chain
program compilers
program debugging
relocate gadget addresses
JIT-ROP attack
scripting engine
Slang
software reusability
Steroids
STEROIDS compiles
Turing machines
Turing-complete computations
vastly different vulnerabilities
vulnerability-independent
Web browser
wide-spread adoption
rop attacks
automated data-oriented programming
Engines
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
Prototypes
composability
Program processors
programming
64-bit applications
security of data
code pointers
code-reuse attacks
code-reuse chain
code-reuse techniques
compiler
conventional code-injection
data structures
data-oriented programming
DOP exploits
DOPed applications
exploitation
high-level language SLANG
biblio
Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
Fuzzy Hashing
WannaCryptor
WannaCry
Syntactics
SSDEEP
similarity preserving hashing
SDHASH
Ransomware
pubcrawl
pam
k-means
Indexes
Scalability
Engines
DIANA
Cryptography
composability
clustering methods
clustering
clara
agnes
Fuzzy Cryptography
Metrics
Resiliency
biblio
Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
static analysis
Locky
program diagnostics
pubcrawl
Ransomware
ransomware pandemic prevention
SDHASH
Semantics
Similarity Preserving
SSDEEP
invasive software
Syntactics
System performance
Triaging
triaging performance
triaging ransomware
WannaCry
WannaCryptor
YARA rules
CryptoWall
Resiliency
Metrics
Fuzzy Cryptography
Cer-ber
Cerber
composability
Context-Triggered Piecewise Hashing
Cryptography
Scalability
cyberthreat hunting
data privacy
dynamic analysis
Engines
file organisation
Fuzzy Hashing
IM-PHASH
Import Hashing
biblio
Evaluating Scientific Workflow Engines for Data and Compute Intensive Discoveries
Submitted by aekwall on Mon, 03/16/2020 - 10:41am
Predictive Metrics
Workflow Engines
scientific workflows
Scientific Experiments
End-to-End Workflows
Data Intensive Discoveries
Converged Workloads
Scientific Computing Security
Compositionality
Software
resilience
Engines
Analytical models
tools
Computational modeling
pubcrawl
Data models
Task Analysis
biblio
SCORE: A Security-Oriented Cyber-Physical Optimal Response Engine
Submitted by grigby1 on Mon, 03/02/2020 - 1:35pm
security of data
power system reliability
power system resilience
power system security
power system stability
pubcrawl
pure cyber-physical states
Relays
resilience
Resiliency
power system operators
security-oriented cyber-physical optimal response engine
Smart Grids
state transition model
substation power systems
Substations
System recovery
transmission line overflow
value and policy iteration
value iteration techniques
Decision Making
cyber physical systems
attack escalation
automatic decision making engine
automatic optimal response systems
Cascading Failures
Computational modeling
cyber-physical decision support system
cyber-physical systems
cyberattack
CPS resilience
Decision support systems
Engines
hybrid cyber-physical states
Markov Decision Process
Markov processes
MDP
optimal response
policy iteration techniques
power engineering computing
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »