Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack surface
biblio
With Great Abstraction Comes Great Responsibility: Sealing the Microservices Attack Surface
Submitted by grigby1 on Fri, 08/28/2020 - 10:50am
attack surface
Cloud Native
container
Docker
Kubernetes
Metrics
microservices
pubcrawl
resilience
Resiliency
Scalability
biblio
Modeling and Reducing the Attack Surface in Software Systems
Submitted by grigby1 on Fri, 08/28/2020 - 10:50am
reduction
system
Software systems
software system
Software
sensitive
security vulnerabilities
security of data
security
Scalability
Resiliency
resilience
attack surface
pubcrawl
Organizations
Metrics
location
Graphical Model
graph theory
Data models
data
Credit cards
Computational modeling
biblio
Attack Surface Identification and Reduction Model Applied in Scrum
Submitted by grigby1 on Fri, 08/28/2020 - 10:50am
security improvement
visualization
visual model
Surface treatment
Software systems
software system
software security vulnerabilities
software prototyping
software engineering
Software
Serum
sensitive data
security of data
attack surface
scrum reduction model
Scalability
Resiliency
resilience
reduction
pubcrawl
Metrics
Identification
Data models
computer security
attack surface identification
biblio
The Case for Robust Adaptation: Autonomic Resource Management is a Vulnerability
Submitted by aekwall on Mon, 08/24/2020 - 11:47am
load dynamics
Dynamic scheduling
ADAPT2
Autonomic computing
autonomic resource management techniques
crippling applications
distributed edge computing systems
dynamic placement
edge security
side-channel attacks
moving-target defense
obfuscate resource management
resource management substrate
single compromised node
state estimation techniques
valuable system
Autonomic Security
composability
Internet of Things
Internet-of-Things
security
attack surface
Software
Adaptation models
Resiliency
pubcrawl
computer network security
resource management
Robustness
resource allocation
fault tolerant computing
quality of service
distributed systems
state estimation
biblio
Software Defined Cyber-Physical Testbed for Analysis of Automated Cyber Responses for Power System Security
Submitted by aekwall on Mon, 08/24/2020 - 11:40am
Industrial Control Systems
system resilience
software defined networking
software defined cyber-physical testbed
Smart Grid
security of data
Resiliency
pubcrawl
power system security
power grids
Power Grid
power engineering computing
microgrid
intelligent decisions
CPS resilience
cyber-physical testbed
cyber-physical systems
cyber security
composability
automated responses
automated response system
Automated Response Actions
automated response
automated health assessment system
Automated Health Assessment
automated cyber responses
attack surface
cyber physical systems
biblio
Modeling Threat of Leaking Private Keys from Air-Gapped Blockchain Wallets
Submitted by grigby1 on Fri, 08/07/2020 - 2:38pm
Markov based mathematical model
threat surface
Resiliency
resilience
pubcrawl
Private Key Storage
private key leakage
private key cryptography
permissioned blockchain
outline justification
Metrics
Media
Mathematical model
Markov processes
Markov model
Air Gapped Storage
malware
key extraction
Human Factors
Human behavior
Electromagnetics
Distributed databases
cryptocurrencies
composability
Channel Exfiltration
attack surface
Atmospheric modeling
air-gapped blockchain wallets
Air gaps
Air Gapped Wallet
biblio
Air Gapped Wallet Schemes and Private Key Leakage in Permissioned Blockchain Platforms
Submitted by grigby1 on Fri, 08/07/2020 - 2:37pm
permissioned blockchain
Markov
Markov model
Markov processes
mathematical analysis
Mathematical model
Media
Metrics
outline justification
malware
permissioned blockchain platforms
private key leakage
Private Key Storage
pubcrawl
resilience
Resiliency
Scalability
security
composability
Air Gapped Wallet
air gapped wallet schemes
Air gaps
Atmospheric modeling
attack surface
blockchain
blockchain security
Channel Exfiltration
Air Gapped Storage
cryptocurrencies
data privacy
Distributed databases
Electromagnetics
Human behavior
Human Factors
key extraction
biblio
A Segregated Architecture for a Trust-based Network of Internet of Things
Submitted by aekwall on Mon, 08/03/2020 - 9:29am
internal devices
adaptive trust model
additional firewall
entities
external devices
external level
homes
industrial systems
inhabitants
inner level
internal network
internal level
segmented architectures
segregated architecture
smart home devices
trust rules
trust-based network
trusted environment
adaptive filtering
pubcrawl
Monitoring
Scalability
Internet of Things
security
attack surface
Internet of Things (IoT)
Trusted Computing
Resiliency
computer network security
privacy
Peer-to-peer computing
Metrics
trust
internet
security threats
Smart homes
Smart Home
biblio
Dangers and Prevalence of Unprotected Web Fonts
Submitted by grigby1 on Fri, 04/17/2020 - 9:46am
Metrics
Web sites
Web Browser Security
Web
unprotected Web fonts
subresource integrity mechanism
stylesheets
SRI support
software vendors
software packages
software package
security-conscious users
Resiliency
resilience
pubcrawl
online front-ends
attack surface
maliciously modified version
malicious script
malicious font
internet
integrity
Human Factors
Human behavior
Google
fonts
fingerprint identification
Cryptography
cryptographic fingerprints verification
Compositionality
composability
CDNs
biblio
Enabling Ubiquitous Hardware Security via Energy-Efficient Primitives and Systems : (Invited Paper)
Submitted by aekwall on Mon, 03/02/2020 - 11:30am
Hardware Security
Ubiquitous Computing Security
ubiquitous hardware security
Thermal stability
security-sensitive applications
random number generators
pufs
power penalty
low-end devices
Low power
HW security
energy-efficient primitives
ubiquitous computing
error correction codes
security
Human Factors
Random access memory
Entropy
attacks
design requirements
Metrics
pubcrawl
Resiliency
power aware computing
attack surface
Hardware
Cryptography
Scalability
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »