Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Instruments
biblio
New Virus Infection Technology and Its Detection
Submitted by grigby1 on Thu, 03/04/2021 - 1:45pm
pubcrawl
Windows system
Windows Operating System Security
Windows operating system
Viruses (medical)
software engineering
security technology
security
Resists
Resiliency
resilience
composability
Microsoft Windows (operating systems)
Metrics
Instruments
Information age
file viruses
file virus infection
dynamic binary instrumentation
computer viruses
computer virus infection
computer virus detection
biblio
Digital Simulation in the Virtual World: Its Effect in the Knowledge and Attitude of Students Towards Cybersecurity
Submitted by grigby1 on Wed, 11/04/2020 - 12:45pm
text-based environment
password usage
Phishing
privacy
pubcrawl
social engineering
student experience
teaching
text analysis
password
user experience
Virtual Learning Environment
Virtual Learning Environments
virtual reality
virtual world
virtual world lessons
VLE
Digital Simulations
Computer crime
computer science education
cyber physical systems
Cybersecurity
cybersecurity attitude
cybersecurity education
cybersecurity knowledge
digital simulation
computer aided instruction
E-Learning
education
Educational institutions
Instruments
invasive software
malware
online scam
biblio
A Graph Theory Approach towards IJTAG Security via Controlled Scan Chain Isolation
Submitted by grigby1 on Mon, 11/02/2020 - 11:28am
Registers
IJTAG network
IJTAG security
Instruments
intellectual property security
isolation signals
microprocessor chips
on-chip access
on-chip instruments
policy-based governance
power consumption
pubcrawl
IJTAG
resilience
Resiliency
scan chain
security
security of data
system-on-chip
system-on-chip designs
third party intellectual property providers
unauthorized user access
untrusted sources
Diagnosis
Clocks
Complexity theory
composability
controlled scan chain isolation
data integrity
Data Integrity Attacks
data manipulation
data protection scheme
data sniffing
debug
design for test
authorisation
electronic design automation
embedded instruments
embedded systems
graph coloring problem
graph colouring
graph theory approach
hidden test-data registers
IEEE standards
IEEE Std 1687
IEEE Std. 1687
biblio
E-Government - Qualified Digital Signature Case Study
Submitted by grigby1 on Fri, 10/16/2020 - 10:14am
institutional websites
Web sites
security
Resiliency
resilience
qualified digital signature case
Qualified Digital Signature
pubcrawl
Portable document format
policy-based governance
Leiria
Law
Instruments
Autenticity
Human behavior
government data processing
Germanium
Electronic government
E-Government
documentation
digital signatures
digital format
Cybersecurity
computer application
collaboration
biblio
An Instrument to Measure Human Behavior Toward Cyber Security Policies
Submitted by aekwall on Mon, 10/12/2020 - 10:42am
Human Factors
security of data
pubcrawl
password
Organizations
Masuerment instrument
Instruments
information technology
Information system policie
information security
behavior pattern
human error
human behavior measurement
Human Behavior and Cybersecurity
Human behavior
Gamification
Electronic mail
cybersecurity policies
Cyber security policies
component
biblio
CONVUL: An Effective Tool for Detecting Concurrency Vulnerabilities
Submitted by grigby1 on Tue, 10/06/2020 - 1:01pm
multi-threading
vulnerabilities
tools
Synchronization
security of data
security
Runtime
Resiliency
resilience
pubcrawl
program diagnostics
multithreaded execution nondeterminism
Clocks
Metrics
Instruments
Instruction sets
cyber physical systems
CPS
CONVUL
Concurrent computing
concurrency vulnerability detection
concurrency control
Concurrency
composability
biblio
SCMiner: Localizing System-Level Concurrency Faults from Large System Call Traces
Submitted by grigby1 on Tue, 10/06/2020 - 1:01pm
Resiliency
multiple processes
practical online bug diagnosis tool
principal component analysis
Production
production system
program debugging
program diagnostics
program testing
pubcrawl
resilience
multiple failing executions
scheduling
SCMiner
security
security of data
statistical analysis
statistical anomaly detection techniques
system call traces
System Level
system-level concurrency fault
tools
event handlers
Computer bugs
Concurrency
concurrency (computers)
Concurrency Failures
Concurrent computing
CPS
cyber physical systems
Data mining
debugging
default system audit tools
composability
failure-inducing system call sequences
fault diagnosis
fault localization
file content
Instruments
interleaving schedule
localizing system-level concurrency faults
Metrics
Multi Process Applications
biblio
Hardening the Core: Understanding and Detection of XNU Kernel Vulnerabilities
Submitted by aekwall on Mon, 07/27/2020 - 11:20am
Compositionality
iOS Security
XNU kernel vulnerability
XNU kernel vulnerabilities
macOS/iOS kernel XNU
KInspector framework
feedback-based fuzzing techniques
feedback based fuzzing
common application vulnerabilities
statistical analysis
Manuals
operating system kernels
fuzzing
security of data
empirical study
Instruments
Human Factors
Engines
security vulnerabilities
vulnerability detection
Metrics
pubcrawl
Resiliency
Kernel
security
biblio
Initial Validation of the Cybersecurity Concept Inventory: Pilot Testing and Expert Review
Submitted by grigby1 on Wed, 03/18/2020 - 10:51am
Instruments
tools
Science of Security
Scalability
Resiliency
resilience
Reliability
pubcrawl
Policy-Governed Secure Collaboration
Metrics
Interviews
assessment validation.
Human behavior
education
cybersecurity education
Cybersecurity Concept Inventory (CCI)
Cybersecurity Assessment Tools (CATS) Project
computer security
composability
collaboration
Cats
biblio
DifFuzz: Differential Fuzzing for Side-Channel Analysis
Submitted by aekwall on Mon, 03/09/2020 - 10:13am
dynamic analysis
predictability
Security Heuristics
unknown side-channel vulnerabilities
secret-dependent paths
secret program data
resource-guided heuristics
resource usage
resource consumption
Performance analysis
Java programs
fuzzing-based approach
DifFuzz
differential fuzzing
side-channel attacks
side-channel analysis
security of data
fuzzing
side-channel
Time factors
Instruments
execution time
program diagnostics
Java
Correlation
tools
vulnerability detection
pubcrawl
Resiliency
Cryptography
Scalability
« first
‹ previous
1
2
3
4
5
6
next ›
last »