Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Prototypes
biblio
Security Analyses of Misbehavior Tracking in Bitcoin Network
Submitted by grigby1 on Wed, 06/15/2022 - 9:56am
research and development
bitcoin security
sybil
spoofing
P2P Networking
DoS attack
Ban Score
denial-of-service attack
cryptocurrency
blockchain
bitcoin
Prototypes
Scalability
Conferences
Human behavior
pubcrawl
Peer-to-peer computing
biblio
Perfect Tabular Hashing in Pseudolinear Time
Submitted by grigby1 on Thu, 06/09/2022 - 1:37pm
pubcrawl
resilience
Conferences
Prototypes
Compositionality
hash table
Time complexity
Hash Function
Hash functions
hash algorithms
Resiliency
2SAT
perfect hashing
SAT
tabulation hashing
biblio
Internet of Things-based Vehicle Tracking and Monitoring System
Submitted by grigby1 on Thu, 06/09/2022 - 8:13am
Metrics
internet of vehicles security
sensor networks
cyber physical systems
Arduino
Human Factors
GPS
Sensor Systems
cloud
Mobile Applications
Internet of Things
sensors
Prototypes
Internet of Vehicles
Safety
Resiliency
resilience
Human behavior
pubcrawl
Cloud Computing
biblio
Mining Learner-friendly Security Patterns from Huge Published Histories of Software Applications for an Intelligent Tutoring System in Secure Coding
Submitted by grigby1 on Wed, 06/08/2022 - 12:54pm
intelligent tutoring systems
Vulnerability
Training
Software
Scalability
Resiliency
resilience
pubcrawl
Prototypes
Knowledge Discovery
expert systems
intelligent data
Explainable Knowledege
encoding
Comprehensibility
Compositionality
Big Data in Software Engineering
Big Data
association rules
security
biblio
Developing Visualisations to Enhance an Insider Threat Product: A Case Study
Submitted by grigby1 on Tue, 06/07/2022 - 10:09am
Data visualization
Usability in security and privacy
interactive systems
Human and Societal Aspects of Security and Privacy
visual analytics
Visualization application domains
security and privacy
human-centered computing
Refining
insider threat
pubcrawl
visualization
Metrics
composability
Prototypes
privacy
Software
policy-based governance
Human behavior
biblio
Real-Time HW and Human-in-the-Loop Simulations for the Validation of Detect and Avoid Advanced Functionalities in ATM Future Scenarios
Submitted by grigby1 on Mon, 06/06/2022 - 12:07pm
Adaptation models
pubcrawl
Prototypes
real-time systems
Atmospheric modeling
Aerospace electronics
Aircraft
human in the loop
Human Factors
air traffic control
ATM complex scenario
detect and avoid system
real-time human-in-the-loop simulations
remotely piloted aircraft systems
biblio
Visual Decision-Support for Live Digital Forensics
Submitted by grigby1 on Mon, 06/06/2022 - 11:15am
Metrics
Visualization systems and tools
visualization
visual analytics
tools
security and privacy
security
Scalability
Resiliency
resilience
pubcrawl
Prototypes
expert systems
Intrusion Detection Systems
human-centered computing
Human behavior
Digital Forensics
Decision Making
Data visualization
Conferences
Computer Forensics
Applied Computing
privacy
biblio
Design of Remote Control Intelligent Vehicle System with Three-dimensional Immersion
Submitted by grigby1 on Mon, 05/23/2022 - 2:59pm
virtual reality
wifi control
Remote control
immersive system
mobile robots
Crawlers
immersive systems
Human-computer interaction
Three-dimensional displays
Monitoring
composability
Prototypes
privacy
Resiliency
Human Factors
Human behavior
pubcrawl
biblio
VulChecker: Achieving More Effective Taint Analysis by Identifying Sanitizers Automatically
Submitted by aekwall on Thu, 05/19/2022 - 12:38pm
security
privacy
Conferences
pubcrawl
Metrics
composability
Semantics
Prototypes
static analysis
Dictionaries
vulnerability detection
taint analysis
sanitizers identification
security check
biblio
HashMTI: Scalable Mutation-based Taint Inference with Hash Records
Submitted by aekwall on Thu, 05/19/2022 - 12:37pm
Software
Scalability
Conferences
pubcrawl
Metrics
composability
Hash functions
Prototypes
fuzzing
Memory management
taint analysis
program analysis
Software Testing
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »