Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Engines
biblio
ArtiFact: Architecture and CAD Flow for Efficient Formal Verification of SoC Security Policies
Submitted by aekwall on Tue, 10/22/2019 - 9:54am
security policy implementation
expensive steps
flexible infrastructure IP
functional design flow
illustrative policies
industrial SoC
integrated circuit design
modern SoC design validation
off-the-shelf formal tools
Security Engine
efficient formal verification
simulation-based security verification
SoC Security
SoC security policies
SoC Verification
streamlined verification
system-level security policies
verification time
verification tools
Security Policies Analysis
Engines
Monitoring
IP networks
system-on-chip
pubcrawl
policy-based governance
Cryptography
tools
security architecture
Complexity theory
security of data
security policy
formal verification
alternative architecture
artifact
CAD
CAD flow
centralized infrastructure IP
complex steps
critical steps
biblio
Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Detection Models
Submitted by aekwall on Mon, 06/24/2019 - 2:43pm
Human behavior
Training
static analysis-based malware classifiers
Resiliency
pubcrawl
program diagnostics
pattern classification
Neural networks
Metrics
malware detection
malware classification accuracy
Malware Analysis
malware
learning (artificial intelligence)
Jacobian matrices
invasive software
adversarial attacks
Engines
Dynamic Malware Classification
dynamic analysis-based
deep learning-based systems
deep learning classification systems
deep learning
crafting adversarial samples
computer security
classification algorithm
anti-malware engine
anti-malware companies
adversarial neural malware detection models
adversarial learning-based attacks
adversarial learning
biblio
Novel Anomaly Detection and Classification Schemes for Machine-to-Machine Uplink
Submitted by grigby1 on Fri, 03/22/2019 - 1:01pm
Monte Carlo methods
low-false alarm rate
low-volume sophisticated attacks
M2M
M2M emergency
machine-to-machine communications
machine-to-machine networks
machine-to-machine uplink
Measurement
Metrics
modified Canberra distance metric
low-complexity
Monte-Carlo simulations
pubcrawl
resilience
Resiliency
Scalability
sensors
standard information technology systems
terminal device failures
volumetric anomaly detection
emergency scenarios
anomaly detection schemes
big data security
classification schemes
Computer crime
computer network security
cyber-attacks
cyber-vulnerabilities
DDoS Attack
Device failures
distributed denial-of-service attacks
Anomaly Detection
Engines
feature extraction
feature-based detection schemes
general M2M uplink
high false-alarm rate
internet
intrusion detection schemes
IT networks
legitimate M2M connections
biblio
One Quantifiable Security Evaluation Model for Cloud Computing Platform
Submitted by grigby1 on Thu, 02/14/2019 - 11:22am
public cloud
visualization
visual graphs
visual display module
System recovery
Security Visualization
security view
security situation
security scanning engine
security recovery engine
security of data
security
Resiliency
resilience
quantifiable security evaluation model
quantifiable evaluation
API
pubcrawl
private cloud
multiple clouds
mixed cloud
maintenance engineering
graph theory
G-Cloud platform
Engines
dynamic security scanning score
Computational modeling
cloud resources
cloud computing platform
Cloud Computing
application security
application program interfaces
biblio
Constraining Attacker Capabilities Through Actuator Saturation
Submitted by grigby1 on Mon, 01/21/2019 - 12:30pm
LTI control systems
vehicles platoon
tools
System performance
security
road vehicles
Resiliency
reachable sets
reachability analysis
pubcrawl
physical limits
outer ellipsoidal bounds
optimization
Metrics
mathematical tools
actuator saturation
Linear systems
linear matrix inequalities
Human behavior
Engines
Ellipsoids
dangerous states
control system synthesis
computer simulations
composability
attacker capabilities
artificial limits
actuators
actuator security
biblio
Propagation Characteristics of Acoustic Emission Signals in Multi Coupling Interface of the Engine
Submitted by grigby1 on Wed, 01/16/2019 - 2:28pm
pubcrawl
Human behavior
Resiliency
Scalability
sensors
acoustic coupling
Blades
Engines
acoustic emission
attenuation
attenuation coefficient
Circuit faults
engine
fault diagnosis
propagation characteristics
Rotors
biblio
RansomWall: A layered defense system against cryptographic ransomware attacks using machine learning
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
Metrics
zero-day intrusions
worldwide cybersecurity attacks
Windows Operating System Security
user files hostage
trees (mathematics)
suspicious ransomware behavior
strong trap layer
specific behavioral patterns
Servers
security of data
Resiliency
RansomWall tag
pubcrawl
operating systems (computers)
Microsoft Windows operating system
attacked OS
malware
machine learning algorithms
learning (artificial intelligence)
layered defense system
invasive software
initial layers
gradient tree boosting algorithm
Engines
encryption
detection rate
Cryptography
cryptographic ransomware families
cryptographic ransomware attacks
Computer crime
composability
biblio
A Framework for Measurability of Security
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
security attribute
Multi-Metrics
privacy
privacy and dependability evaluation complexity
pubcrawl
resilience
Resiliency
Scalability
security
multi metrics
security enhancement
Security Evaluation
security function
security measurability
security metric
SPD evaluation complexity
system analysis and design
Communication Systems
MM framework
Measurement
Internet of Things
internet
Human behavior
experts knowledge systematic storage
expert systems
expert knowledge retrieval
ES
Engines
embedded systems
Embedded System
Databases
data privacy
computer network security
biblio
A Fault Diagnosis Expert System for Flight Control Software Based on SFMEA and SFTA
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
inference engine
software reliability analysis methods
software reliability
software fault tree analysis
software fault knowledge
software failure mode and effect analysis
Software
SFTA
SFMEA
security
Scalability
Resiliency
resilience
pubcrawl
Knowledge representation
inference mechanisms
aerospace applications
human-computer interaction interface
human computer interaction
Human behavior
flight control software
fault diagnosis expert system
fault diagnosis
expert systems
expert system
Engines
control engineering computing
CLIPS shell
CLIPS
airborne software engineering
aerospace control
aerospace computing
biblio
Improvement of Privacy Preserved Rule-Based Risk Analysis via Secure Multi-Party Computation
Submitted by grigby1 on Wed, 11/14/2018 - 1:19pm
privacy protection
Servers
secure risk analysis method
secure multiparty computation
secret sharing
Scalability
risk analysis
Random access memory
pubcrawl
Prototypes
Protocols
Attack Tree Analysis
privacy preserved rule-based risk analysis
privacy
Ports (Computers)
Human Factors
expert systems
Engines
data privacy
Cryptography
confidential information leakage
confidential information abuse
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »