Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Instruments
biblio
Prevention of Data Leakage due to Implicit Information Flows in Android Applications
Submitted by aekwall on Mon, 01/27/2020 - 9:28am
privacy policy enforcement
taint analysis
Smalien enforced privacy policy
implicit information flows
implicit information flow
IIFs
IIF-contained information
IIF-accompanied attacks
IIF tricks
IIF detection technique
explicit information
dynamic taint analysis technique
dynamic taint analysis
DTA technique
Android applications
security of data
Android (operating system)
android
Instruments
data leakage
Metrics
privacy
composability
pubcrawl
mobile computing
performance evaluation
security
Runtime
data privacy
Servers
biblio
Information Security Policy Perceived Compliance Among Staff in Palestine Universities: An Empirical Pilot Study
Submitted by grigby1 on Tue, 01/21/2020 - 10:23am
planned behaviour theory
Instruments
ISP
Least squares approximations
Mathematical model
Metrics
organisational aspects
Palestine university staffs
partial least squares structural equation modelling
Personnel
insider threat
PLS-SEM
policy-based governance
protection motivation theory
pubcrawl
resilience
Resiliency
security of data
statistical analysis
General Deterrence Theory
appraisal
Bibliographies
collaboration
Communications technology
compliance behaviour
data collection method
Educational institutions
employees
Security Policies Analysis
government policies
Human behavior
Human Factors
information reinforcement theory
information security
information security policy
Information Security Policy Awareness
information security risks mitigation
biblio
On Integrating Lightweight Encryption in Reconfigurable Scan Networks
Submitted by aekwall on Mon, 01/20/2020 - 11:01am
RSN
intellectual property
Lightweight Ciphers
lightweight stream cipher
logic testing
maintenance
malicious users
novel hardware
on-chip instrumentation
pubcrawl
PUF
reconfigurable scan networks
Resiliency
integrating lightweight encryption
Scalability
seamless integration
secret keys
Secure Wrapper
self-test
sensitive data
Software
software combined approach
system-on-chip
testing workflow
versatile software toolchain
flexible access
appropriate counter-measures
Ciphers
Cryptographic Protocols
Cryptography
data integrity
data privacy
debug modules
embedded instrumentation
embedded systems
encryption
field programmable gate arrays
-play instrument wrapper
FPGA-based implementation
Hardware
Hardware Security
IEEE standards
IEEE Std 1687
IEEE Std 1687 RSNs
IJTAG
industrial property
instrument wrapper
Instruments
integrated circuit testing
biblio
Cyber deterrence in times of cyber anarchy - evaluating the divergences in U.S. and Chinese strategic thinking
Submitted by aekwall on Wed, 12/18/2019 - 1:37pm
Human behavior
war-fighting
US Department of Defense
U.S. strategic thinking
U.S. government
strategic cultures
Sino-U.S. cyber interactions
security of data
Scalability
resilience
pubcrawl
programmable logic arrays
People’s Liberation Army
national contexts
Instruments
Beijing
Economics
Deterrence
Cyberspace
cyber warfare
cyber threats
cyber strategy
cyber domain
cyber deterrence
cyber conflict
Cyber Attacks
cyber anarchy
Context
Chinese strategic thinking
China
biblio
Detecting Data Races Caused by Inconsistent Lock Protection in Device Drivers
Submitted by grigby1 on Tue, 11/26/2019 - 2:35pm
Kernel
Scalability
runtime analysis approach
runtime analysis
Runtime
Resiliency
resilience
pubcrawl
program diagnostics
pattern locks
Monitoring
Linux driver patches
Linux
concurrency control
Instruments
inconsistent lock protection
Human Factors
human factor
Human behavior
driver execution
DILP
device drivers
device driver
data race
Concurrent computing
biblio
Fine-Grained Provenance for Matching ETL
Submitted by aekwall on Mon, 09/23/2019 - 9:40am
provenance APIs
data provenance tools
data science tasks
data types
data warehouses
database provenance tools
database-style provenance techniques
matching computations
matching tasks
Provenance
data objects
provenance-driven troubleshooting tool
PROVision
Record linking
support optimization
track provenance
tuple-level provenance
workflow
workflow management software
workflow provenance systems
Data mining
Resiliency
Human behavior
pubcrawl
composability
Metrics
optimization
ETL
tools
data analysis
Task Analysis
database management systems
application program interfaces
Instruments
Semantics
algebra
arbitrary code
code versions
common ETL
biblio
Information Assurance in modern ATE
Submitted by aekwall on Mon, 08/05/2019 - 9:40am
Instruments
tools
Task Analysis
software footprint
security of data
security
Resiliency
pubcrawl
policy-based governance
operating systems (computers)
operating system
microsoft windows
Metrics
internet
anti-virus
Information Assurance
Human behavior
electronic devices
cyber security
Computers
computer viruses
computer
composability
automatic test equipment
ATE system software
ATE OS settings
ATE
biblio
eAssessment by Using a Trustworthy System in Blended and Online Institutions
Submitted by grigby1 on Fri, 02/08/2019 - 3:36pm
keystroke dynamics
voice recognition
Trustworthy Systems
trustworthy system
trustworthiness
trust-driven solutions
TeSLA system
Technology-enhanced learning
Task Analysis
Speech recognition
Resiliency
resilience
pubcrawl
Plagiarism
online learning
online evaluation
assessment tasks
internet
Instruments
innovative solution
further education
Fingerprint recognition
face recognition
Educational institutions
eAssessment
cyber physical systems
computer aided instruction
composability
challenging problems
blended-learning
blended university
authentication
biblio
A dark web story in-depth research and study conducted on the dark web based on forensic computing and security in Malaysia
Submitted by grigby1 on Wed, 09/12/2018 - 10:15am
URL
website links
skynet
Malaysia
forensic computing
dark web story
dark web security
cryptocurrency
Government
Instruments
pubcrawl
Digital Forensics
dark web
Web sites
internet
drugs
Conferences
malware
Human Factors
Human behavior
biblio
Security issues in controller area networks in automobiles
Submitted by grigby1 on Wed, 09/05/2018 - 9:55am
instrument cluster
controller area networks
BMW E90 instrument cluster
CAN (Controller Area Network)
CAN protocol
CAN-bus
ECU
ECU (Electronic Control Unit)
electronic control units
controller area network
modern automobiles
modern car hacking
modern vehicles
render vehicles
Rogue device
spoofed messages
controller area network security
data encryption
pubcrawl
Resiliency
performance evaluation
Cryptography
Protocols
security of data
authentication
Safety
security
automobiles
traffic engineering computing
security issues
resilience
Instruments
Automotive engineering
automotive electronics
« first
‹ previous
1
2
3
4
5
6
next ›
last »