Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Kernel
biblio
Lightweight Virtualization Approaches for Software-Defined Systems and Cloud Computing: An Evaluation of Unikernels and Containers
Submitted by aekwall on Tue, 09/08/2020 - 10:16am
Virtual machine monitors
policy governance
clean slate
Unikernels
unikernel technologies
software-defined systems
software defined systems
software defined cloud computing
lightweight virtualization technologies
lightweight virtualization approaches
legacy unikernels
hardware infrastructure
Docker LinuxKit
Docker Containers
cloud infrastructure components
big monolithic applications
Cloud Computing
operating systems
virtual machines
operating systems (computers)
Virtualization
cloud
performance evaluation
Containers
software libraries
Metrics
pubcrawl
Human behavior
Resiliency
Kernel
virtualisation
Servers
biblio
LBM: A Security Framework for Peripherals within the Linux Kernel
Submitted by grigby1 on Fri, 09/04/2020 - 4:26pm
powerful filtering functionality
Linux (e)BPF modules
Linux kernel
Linux-Kernel
malicious peripherals
malicious USB
NFC devices
operating systems (computers)
OS software stacks
Peripheral
peripheral attack surface
Linux
Protocols
pubcrawl
resilience
Resiliency
security
Smartphones
standardized communication protocols
Universal Serial Bus
USB
cyber physical systems
Metrics
Predictive Metrics
Bluetooth
bluetooth security
composability
computer network security
computer peripheral equipment
Computer peripherals
Cyber Physical System
Linux Operating System Security
eBPF
eBPF packet filtering mechanism
external GPU
filtering theory
general security framework
host operating system
Human behavior
Kernel
LBM framework
biblio
A Novel Approach of Unprivileged Keylogger Detection
Submitted by grigby1 on Fri, 09/04/2020 - 3:17pm
Keyboards
BIOS Security
userspace keylogger detection
unprivileged keylogger detection
surveillance software
spyware
privileged
operating system kernels
monitoring software
malware packages
keystroke simulation
keystroke logger
Keylogger userspace
Kernel keylogger
confidential data stealing
authorisation
microsoft windows
Human Factors
Kernel
Computers
resilience
Resiliency
Metrics
pubcrawl
mobile computing
security
invasive software
Scalability
Monitoring
biblio
STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection
Submitted by aekwall on Mon, 08/17/2020 - 11:18am
hybrid deep neural network design
graph Laplacian matrix
attack graphs
dimensionality reduction
graph characterization vectors
graph kernel matrices
graph signal processing
graph similarity measures
graph structures
high-dimensional intrinsic representation
high-dimensional representations
hybrid deep learning models
Matrix converters
kernel-based similarity embedding vector
long-term information learning
long-term network attack detection
network communication data
real-world network attack datasets
spatial-temporal deep learning
spatiotemporal deep learning
structural similarity information
supervised classification task
temporal communication graph
traffic analysis methods
CNN
IP networks
telecommunication traffic
Kernel
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
matrix algebra
pattern classification
computer network security
convolutional neural nets
convolutional neural network
network traffic
deep learning
signal processing
LSTM
Predictive Metrics
Laplace equations
Long short-term memory
Graph Kernel
network flows
biblio
Empirical Performance Evaluation of QUIC Protocol for Tor Anonymity Network
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
Multiplexing
transport protocols
transport design
Tor transport layer
Tor anonymity network
Tor
QUIC protocol
QUIC
Performance
onion routers
head-of-line blocking problem
handshaking delays
Google protocol
empirical performance evaluation
Anonymity Network
sockets
security
Relays
anonymity
Metrics
public domain software
Kernel
delays
composability
Protocols
internet
data privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering
Submitted by aekwall on Mon, 08/03/2020 - 10:28am
adaptive filters
adaptive filtering
Tofino switch
programmable switches
NETHCF
memory usage
memory resources
IP2HC
IP-to-Hop-Count mapping table
IP popularity
in-network system
HCF system
end-to-end routing
design adaptive mechanisms
adaptive spoofed IP traffic filtering
computer network security
telecommunication switching
Switches
Pipelines
Bandwidth
telecommunication network routing
internet
Metrics
pubcrawl
Resiliency
Kernel
telecommunication traffic
Servers
Scalability
IP networks
biblio
False Sense of Security: A Study on the Effectivity of Jailbreak Detection in Banking Apps
Submitted by grigby1 on Thu, 07/30/2020 - 2:32pm
operating system
iOS Security
Study
sensitive data protection
Mobile communication
Jailbreak Evasion
jailbreak detection
iOS App Store
banking transactions
banking app
Banking
ios
two-factor authentication
bank data processing
mobile devices
feature extraction
Trusted Computing
operating systems (computers)
Compositionality
Metrics
trusted environment
Kernel
Data protection
smart phones
mobile computing
authentication
message authentication
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Hardening the Core: Understanding and Detection of XNU Kernel Vulnerabilities
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
Compositionality
iOS Security
XNU kernel vulnerability
XNU kernel vulnerabilities
macOS/iOS kernel XNU
KInspector framework
feedback-based fuzzing techniques
feedback based fuzzing
common application vulnerabilities
statistical analysis
Manuals
operating system kernels
fuzzing
security of data
empirical study
Instruments
Human Factors
Engines
security vulnerabilities
vulnerability detection
Metrics
pubcrawl
Resiliency
Kernel
security
biblio
Security in iOS and Android: A Comparative Analysis
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
android
iOS Security
permission analysis
ios
hybrid mobile application
Apache Cordova
iOS (operating system)
security features
Permission
Compositionality
user privacy
mobile devices
Android (operating system)
security of data
Human Factors
internet
Metrics
privacy
pubcrawl
Resiliency
mobile computing
Kernel
security
Hardware
data privacy
biblio
Intrusion-Tolerant Autonomous Driving
Submitted by aekwall on Mon, 07/27/2020 - 12:11pm
Sophisticated Attacks
intrusion tolerance
well equipped adversarial teams
real time systems
predictable hardware
killer application
intrusion-tolerant autonomous driving
intrusion-tolerant architecture
intrusion tolerant design
highly skilled equipped adversarial teams
fault-and-intrusion tolerance toolboxes
fault and intrusion tolerance
complex software
real-time systems
automobiles
Autonomous Driving
distributed systems
fault tolerant computing
composability
pubcrawl
Resiliency
computer architecture
Kernel
Task Analysis
traffic engineering computing
security of data
Safety
autonomous vehicles
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »