Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Prototypes
biblio
Bytecode Heuristic Signatures for Detecting Malware Behavior
Submitted by aekwall on Mon, 03/09/2020 - 10:13am
virtual machines
predictability
Security Heuristics
signature
reactive security solutions
proactive behavior heuristics
proactive approaches
malicious applications
heuristic
hash-based signatures
bytecode heuristic signatures
bytecode
behavior based detection
behavior
response time
Instruction sets
Monitoring
Computer languages
low performance overhead
Prototypes
malware behavior
computational complexity
Virtual machining
digital signatures
pubcrawl
Resiliency
invasive software
malware detection
security
malware
Scalability
biblio
On Design and Implementation a Federated Chat Service Framework in Social Network Applications
Submitted by aekwall on Mon, 02/10/2020 - 11:08am
Human Factors
Social Agents
user profiles
switching cost
social network applications
service requests
Messengers
federated chat service framework
chat services
Prototypes
Switches
Scalability
Standards organizations
chatbots
internet
social networking (online)
Facebook
privacy
pubcrawl
mobile computing
Organizations
biblio
Realization of System Verification Platform of IoT Smart Node Chip
Submitted by grigby1 on Tue, 11/12/2019 - 3:29pm
IoT smart node chip
Wireless fidelity
transmission protocol
Systems Simulation
system verification platform
system verification
simulation verification
pubcrawl
Prototypes
Protocols
protocol verification
privacy
policy-based governance
large scale integrated circuits
automobiles
IoT node
Internet of Things
FPGA-based prototype verification
FPGA
formal verification
field programmable gate arrays
efficient verification platform
design cost reduction
Compositionality
composability
collaboration
chip design cycle
biblio
Compiler-Assisted Code Randomization
Submitted by aekwall on Mon, 10/14/2019 - 9:20am
Scalability
Prototypes
pubcrawl
randomized variants
Resiliency
return oriented programming
return-oriented programming
Robustness
Runtime
program compilers
security
security of data
Software
software distribution models
software distribution norms
software diversification
software engineering
transformation-assisting metadata
composability
applied code transformation
CCR
code randomization
code uniformity
compiler level protection
compiler-assisted code randomization
compiler-rewriter cooperation
compiler security
address space layout randomization
Compositionality
fine-grained code randomization
fine-grained code transformation
Hardware
Human behavior
LLVM compiler toolchain
metadata
Metrics
biblio
A Data Provenance Visualization Approach
Submitted by aekwall on Mon, 09/23/2019 - 9:41am
Data visualization
W3C-PROV-O specification compatible provenance data
social networking (online)
provenance visualization
PROV-O
Prototypes
open source visualization tool
data provenance visualization approach
data lineage
data provenance
Provenance
data visualisation
Big Data
public domain software
data analysis
metadata
tools
Metrics
component
composability
pubcrawl
Human behavior
Resiliency
Classification algorithms
biblio
Development of a suite of IPv6 vulnerability scanning tests using the TTCN-3 language
Submitted by grigby1 on Mon, 01/21/2019 - 11:15am
test maintainability
program testing
Protocols
Prototypes
pubcrawl
Resiliency
security of data
specification languages
telecommunication computing
telecommunication security
test extensibility
passive analysis
test specification language
testing
Testing and Test Control Notation version 3
transport protocols
TTCN-3
TTCN-3 language
vulnerability assessment
vulnerability detection
Vulnerability Management
vulnerability scanning
Human behavior
application security
attacks simulation
Compositionality
Computer crime
denial of service
denial-of-service attack detection
Device Security
dual-stack networks
Duplicate Address Detection
Formal Specification
Address autoconfiguration
ICMPv6 Protocol
internet
IP networks
IPv4 IPv6 protocol
IPv6
IPv6 networks
IPv6 vulnerability scanning tests
Linux
Metrics
network communications
biblio
Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy
Submitted by grigby1 on Wed, 01/16/2019 - 1:31pm
transport protocols
wearables security
unauthorized wearable devices
transport layer security handshake protocol
TLS handshake protocol
session key
sensitive data
secure data transmission
Prototypes
mobile authentication proxy
handshake protocol
Data collection
authentication protocol
application server
Wearable Device
proxy
authorisation
Servers
Cryptography
Cryptographic Protocols
performance evaluation
message authentication
telecommunication security
Protocols
Scalability
Resiliency
Human behavior
pubcrawl
authentication
biblio
Securing Augmented Reality Output
Submitted by grigby1 on Mon, 11/19/2018 - 11:14am
policy framework
virtual content
security of data
security
Scalability
Resists
Resiliency
resilience
pubcrawl
Prototypes
privacy
AR technologies
input privacy risks
Industries
Human behavior
data privacy
Automotive engineering
automotive components
automobiles
augmented reality output security
augmented reality
Arya
biblio
Improvement of Privacy Preserved Rule-Based Risk Analysis via Secure Multi-Party Computation
Submitted by grigby1 on Wed, 11/14/2018 - 12:19pm
privacy protection
Servers
secure risk analysis method
secure multiparty computation
secret sharing
Scalability
risk analysis
Random access memory
pubcrawl
Prototypes
Protocols
Attack Tree Analysis
privacy preserved rule-based risk analysis
privacy
Ports (Computers)
Human Factors
expert systems
Engines
data privacy
Cryptography
confidential information leakage
confidential information abuse
biblio
CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers
Submitted by grigby1 on Thu, 06/07/2018 - 2:15pm
scalable system
PKI
privacy
privacy concerns
Protocols
Prototypes
pubcrawl
Rapid7
resilience
Resiliency
revocation
Scalability
online front-ends
security of data
Servers
space-efficient filter cascade data structure
SSL certificate revocations
SSL revocation checking
SSL Trust Models
TLS certificate revocations
TLS revocation checking
Transport Layer Security
University of Michigan
data structures
Browsers
certificate transparency
client-server systems
CRL
CRL checking
CRLite servers
CRLs
CRLSet
Cryptography
data privacy
Bloom filter
fail-closed security posture
Firefox
Google Certificate Transparency
Human behavior
internet
Metrics
OCSP
OCSP checking
OCSP Stapling
OneCRL
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
next ›
last »