Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security vulnerability
biblio
Security Vulnerability and Mitigation in Photovoltaic Systems
Submitted by grigby1 on Fri, 11/18/2022 - 2:48pm
security
Intrusion Detection
pubcrawl
resilience
Resiliency
Software
performance evaluation
Scalability
Prototypes
security vulnerability
mitigation
Inverters
Photovoltaic systems
Security by Default
biblio
Design and Implementation of Security Test Pipeline based on DevSecOps
Submitted by grigby1 on Fri, 11/18/2022 - 2:07pm
Software
Security Risk Management
devsecops
Security test
project management
Pipelines
security vulnerability
maintenance engineering
Scalability
information security
Conferences
Resiliency
resilience
Metrics
Human Factors
Human behavior
pubcrawl
security
biblio
BranchSpec: Information Leakage Attacks Exploiting Speculative Branch Instruction Executions
Submitted by aekwall on Mon, 03/15/2021 - 12:10pm
Side Channel
BranchSpec attacks
called BranchSpec
Coffee Lake-based processors
existing speculative attacks
harness branch predictors
information leakage attacks
information leakage threat
microarchitectural attack
microarchitectural side channels
processor hardware vulnerabilities
processor microarchitectural components
processor microarchitecture
branch predictor
simpler code patterns
speculative branch executions
speculative branch instruction executions
speculative execution
speculative executions
speculative path
speculative state update
speculatively executed branches
Transient Execution Attack
transient execution attacks
transient executions
victim
microprocessor chips
Scalability
Conferences
telecommunication security
Hardware
attack surface
History
information security
Resiliency
pubcrawl
Metrics
security vulnerability
Transient analysis
security of data
Compositionality
Instruction sets
program compilers
microarchitecture
Spectre
compiler security
Surface treatment
sensitive information
computer architecture
parallel architectures
branch pattern history structure
branch prediction mechanisms
biblio
Security and Privacy Analysis of Wearable Health Device
Submitted by grigby1 on Mon, 12/28/2020 - 12:28pm
security
mobile computing
mobile devices
mobile health
mobile wearable health devices
privacy
privacy breach
privacy features
Privacy Risk
pubcrawl
resilience
Resiliency
malicious attack
Security analysis
security risk
security vulnerability
sensitive data information
sensitive information
Servers
telecommunication security
user data security
user sleeping arrangements
Wearable devices
dieting formula
authorisation
Biomedical monitoring
Bluetooth
Bluetooth networking
Bluetooth pairing process
bluetooth security
composability
Computer crime
data privacy
Data Security
wearables security
eating constraint
fitbit
Google Glass
Hacker
health care
health monitor system
health tracker devices
Human behavior
human health parameter monitoring
Jawbone
biblio
On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
privacy
witness functions
Waste materials
telecommunication security
security vulnerability
security of data
security
Reliability
pubcrawl
protocol verification
collaboration
policy-based governance
Policy Based Governance
Needham-Schroeder symmetric-key protocol
formal verification
encryption
Cryptographic Protocols
Compositionality
composability
biblio
Towards Automated Security Vulnerability and Software Defect Localization
Submitted by grigby1 on Mon, 02/10/2020 - 11:36am
program diagnostics
undiscovered vulnerabilities
tools
static code analysis
Software systems
software maintenance
software defects
software defect localization
software defect
security vulnerability
security vulnerabilities
security of data
security
resilience
static analysis
modern software
Defect Localization
Cybersecurity
Correlation
Computer bugs
bug
automated security vulnerability
Automated Secure Software Engineering
Resiliency
composability
Human behavior
pubcrawl
biblio
Detecting and Analyzing Zero-Day Attacks Using Honeypots
Submitted by aekwall on Mon, 01/20/2020 - 12:05pm
Predictive Metrics
Zero-day attacks
zero-day attack detection
zero-day attack analysis
Zero Day Attacks and Defense
Virtual machining
virtual machines
virtual machine
Snort intrusion prevention system
Snort intrusion detection system
security vulnerability
security
Resiliency
pubcrawl
Protocols
Zero day attacks
Ports (Computers)
operating systems
malware
IP networks
invasive software
intrusion detec- tion/prevention system
information security domain
honeypot system
honeypot
Dictionaries
computer network security
computer network
composability
defense
biblio
Vulnerability and Protocol Association of Device Firmware in Power Grid
Submitted by grigby1 on Tue, 11/19/2019 - 3:42pm
Metrics
vulnerability information correlation
vulnerability association
security vulnerability
Safety
Resiliency
resilience
pubcrawl
Protocols
protocol association
power system security
power system control
power grids
power grid vulnerability analysis
composability
mass grid device firmware device attributes
intelligent power grid
Inspection
industrial power systems
industrial control system device firmware
industrial control equipment safety inspection
industrial control device firmware protocol vulnerabilities
industrial control
firmware preprocessing
firmware
features extraction
Control equipment
biblio
Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
tools
program testing
pubcrawl
Resiliency
security vulnerability
SQL
SQL injection
SQLI
SQLi vulnerabilities
SQLMAP
privacy
Vulnerability
Vulnerability Analysis
vulnerability scanner
Web application
web applications
Web sites
websites
WordPress
Drupal website pages
Computer hacking
content management
content management systems
Cybersecurity
data confidentiality
data integrity
Data protection
Databases
Computer crime
Human behavior
internet
Joomla website pages
LAMP server
Metrics
Nikto
Penetration Testing
policy-based-governance
biblio
An Emulation of Sql Injection Disclosure and Deterrence
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
password
Web applications authorization
Web applications authentication
web applications
SQL injection disclosure
SQL injection deterrence
SQL injection
SQL
security vulnerability
Scalability
Resiliency
resilience
pubcrawl
password security
authentication
message authentication
internet
information retrieval
Human Factors
honey pots
Honey pot mechanism
Honey Pot
Heisenberg analysis
Databases
data retrieval
Companies
authorisation
1
2
3
next ›
last »