Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Linux
biblio
Challenges and Opportunities in Performance Benchmarking of Service Mesh for the Edge
Submitted by grigby1 on Fri, 08/26/2022 - 9:49am
Complexity theory
Envoy
Microservice architectures
edge
Computing Theory
benchmark
Service Mesh
Kubernetes
Istio
Compositionality
pubcrawl
Kernel
Linux
Benchmark testing
composability
Data models
Throughput
Resiliency
resilience
biblio
Practical Principle of Least Privilege for Secure Embedded Systems
Submitted by grigby1 on Tue, 08/02/2022 - 3:21pm
embedded systems
Resiliency
composability
Metrics
Communication channels
control systems
Linux
pubcrawl
real-time systems
resilience
security
Synchronization
Trustworthy Systems
biblio
Security analysis of the Raspbian Linux operating system and its settings to increase resilience against attacks via network interface
Submitted by grigby1 on Fri, 07/29/2022 - 4:13pm
Security by Default
cyber attack
cyber security
internet
IP networks
Linux
Network interfaces
operating systems
Operating systems security
pubcrawl
Raspbian
resilience
Resiliency
security
Servers
biblio
Study on Systematic Ransomware Detection Techniques
Submitted by aekwall on Thu, 07/14/2022 - 3:19pm
Systematics
osquery
open-source EDR
Open Source hids SECurity (OSSEC)
Google rapid response
endpoint detection and response (EDR)
ransomware detection
pubcrawl
Ransomware
Internet of Things
composability
Resiliency
Metrics
feature extraction
Linux
Computer crime
tools
biblio
A Secure and Formally Verified Linux KVM Hypervisor
Submitted by grigby1 on Thu, 05/12/2022 - 9:50am
virtualization privacy
composability
Cryptography
cyber physical systems
Hardware
information management
Linux
privacy
pubcrawl
resilience
Resiliency
security
Virtual machine monitors
virtual machine security
Virtual machining
biblio
Vulnerability Detection Algorithm of Lightweight Linux Internet of Things Application with Symbolic Execution Method
Submitted by aekwall on Tue, 05/10/2022 - 12:49pm
Compositionality
Fluctuations
Human behavior
information science
Internet of Things security (IoTS)
Linux
maintenance engineering
Manuals
Metrics
pubcrawl
Resiliency
Robustness
Stability analysis
Symbol execution
vulnerability detection
biblio
Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)
Submitted by aekwall on Tue, 04/19/2022 - 10:16am
cross layer attack
Cross Layer Security
UDP
stub resolver
Psuedo Random Number Generator
open systems
Kernel
IP ID
flow label
DNS cache poisoning
device tracking
Cross layer design
Protocols
pubcrawl
android
PRNG
Object recognition
Prediction algorithms
TCP
composability
Resiliency
Linux
Containers
biblio
Auditing Linux Operating System with Center for Internet Security (CIS) Standard
Submitted by grigby1 on Fri, 04/01/2022 - 12:33pm
Linux
Security Audits
CIS
chef
Internet security
Hardening
Ubuntu
operating systems
network topology
tools
Manuals
Benchmark testing
Scalability
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
VPNoT: End to End Encrypted Tunnel Based on OpenVPN and Raspberry Pi for IoT Security
Submitted by aekwall on Mon, 03/14/2022 - 12:44pm
Predictive Metrics
Router Systems Security
vpnot
vpn
tunnel
Transport Layer Security
Raspberry Pi
OpenVPN
integrity
Costs
Virtual private networks
Logic gates
Media
confidentiality
IoT
Resiliency
pubcrawl
encryption
Linux
authentication
sensors
security
biblio
‘WLAN Security Protocols and WPA3 Security Approach Measurement Through Aircrack-ng Technique’
Submitted by aekwall on Mon, 03/14/2022 - 12:42pm
security
Protocols
Linux
Computer hacking
pubcrawl
Resiliency
wireless networks
Predictive Metrics
Atmospheric modeling
Aircrack-ng
Airodump-ng
Crack
Kali Linux
Standards organizations
Router Systems Security
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »