Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
system monitoring
biblio
A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning
Submitted by grigby1 on Fri, 04/17/2020 - 11:28am
system monitoring
OS kernel
OS resource management
pubcrawl
Registers
resilience
Resiliency
rootkit
run-time features
security of data
OS
target kernel module
TF-IDF method
user-mode rootkit detection
Virtual machine monitors
virtual machines
virtualisation
Virtualization
windows kernel rootkits
Windows Operating System Security
kernel space
feature extraction
Hardware
hardware assisted virtualization technology
invasive software
Kernel
kernel rootkit
kernel rootkit detection approach
kernel rootkit detection solution
kernel rootkit detection system
composability
learning (artificial intelligence)
machine learning
machine learning techniques
malicious kernel module
Metrics
operating system
operating system kernels
operating systems (computers)
biblio
On the Practicality of a Smart Contract PKI
Submitted by aekwall on Mon, 04/06/2020 - 10:16am
Distributed Applications
smart contract
PKI Trust Models
Additives
communication security
accumulator
blockchain-based identity systems store
centralized authorities
constant-sized state
constant-sized storage
contracts
identity records verification
live chain
main building blocks
provably secure contract
public key infrastructures
securing communications
smart contract PKI
smart contract platform
blockchain
telecommunication security
system monitoring
Resiliency
Human behavior
pubcrawl
privacy
Cryptography
Metrics
Scalability
internet
smart contracts
ethereum
public key cryptography
computational complexity
Formal Specification
software fault tolerance
Security Properties
biblio
HyperPS: A Hypervisor Monitoring Approach Based on Privilege Separation
Submitted by grigby1 on Fri, 03/27/2020 - 11:28am
security of data
policy-based governance
privilege separation
pubcrawl
Registers
resilience
Resiliency
Safe Coding
security
operating system kernels
security-sensitive system resources
system monitoring
system software error
Trusted Computing
trusted environment
Virtual machine monitors
virtual machines
Virtualization
Kernel
cloud environment
collaboration
guest virtual machine security
Human behavior
Human Factors
HyperPS
hypervisor monitoring
hypervisor security
Cloud Computing
KVM hypervisor
Linux
Logic gates
Metrics
microhypervisor reducing attack surface
Monitoring
monolithic operating system
biblio
Complex Network Cybersecurity Monitoring Method
Submitted by grigby1 on Wed, 03/18/2020 - 11:51am
resource management
Science of Security
Human behavior
resilience
Resiliency
Metrics
Policy-Governed Secure Collaboration
collaboration
composability
pubcrawl
Task Analysis
system monitoring
special-purpose devices
security sensor
security of data
resource allocation
limited resource allocation
cybersecurity monitoring
complex networks
complex network unit cybersecurity
complex network cybersecurity monitoring
complex network
Bipartite graph
computer security
Scalability
Monitoring
sensors
biblio
A Low-Overhead Kernel Object Monitoring Approach for Virtual Machine Introspection
Submitted by grigby1 on Mon, 03/09/2020 - 1:25pm
pubcrawl
virtualisation
virtual-machine-introspection-based security monitors
Virtual machining
virtual machines
virtual machine security
Virtual machine monitors
virtual machine introspection
tools
system monitoring
storage management
Semantics
security of data
security
Cloud Computing
page-level monitoring
page-level monitor
page-level memory monitor
out-of-virtual-machine security tools
operating system kernels
Monitoring
monitor target kernel objects
memory pages
memory page
low-overhead kernel object monitoring
kernel object modification monitoring
Kernel
dentry object monitoring
biblio
Spam Domain Detection Method Using Active DNS Data and E-Mail Reception Log
Submitted by grigby1 on Mon, 02/10/2020 - 11:17am
Metrics
unsolicited e-mail
Training
system monitoring
supervised learning
spoofed e-mails
SPF
spam mail
spam domain detection
spam detection
sender IP address
sender domain authentication
Scalability
pubcrawl
Postal services
active DNS
message authentication
IP networks
internet
Human Factors
Human behavior
feature extraction
Electronic mail
e-mail reception log
e-mail log analysis
DMARC
DKIM
authentication
active DNS data
biblio
FIoT: Detecting the Memory Corruption in Lightweight IoT Device Firmware
Submitted by aekwall on Mon, 01/20/2020 - 12:13pm
library function identification approach
dynamic analysis framework
dynamic analysis techniques
embedded firmware source code
FIoT framework
firmware analysis
firmware images
fuzzing
fuzzing test
hardware architectures
IoT device operating systems
IoT industry
CFG recovery approach
lightweight IoT device firmware images
lightweight IoT firmware
memory corruption
memory corruption vulnerabilities
Microprogramming
Program slicing
security researchers
time 170.0 s
time 210.0 s
time 40.0 s
zero trust
firmware
Scalability
Internet of Things
security
performance evaluation
system monitoring
Resiliency
pubcrawl
policy-based governance
program testing
Libraries
static analysis
computer network security
program diagnostics
Human Factors
operating systems (computers)
program compilers
Loading
lightweight IoT devices
address determination analysis
backward slice approach
binary code snippets
Binary codes
binary firmware
biblio
Destructive Attacks Detection and Response System for Physical Devices in Cyber-Physical Systems
Submitted by aekwall on Mon, 01/13/2020 - 12:17pm
repetitive operational profile
physical damage
Physical damage control
Physical Threats in IoT
PLC
policy-based governance
programmable controllers
programmable logic controller
pubcrawl
operating devices
Resiliency
response system
SCADA server
SCADA systems
SCADA Systems Security
security
security of data
system monitoring
destructive attacks detection
actuator security
actuators
composability
Compositionality
Computer worms
CPS
cyber-physical system security
cyber-physical systems
actuator
Hardware
Human behavior
IoT security
malicious operation
Metrics
middleware
middleware security
Monitoring
biblio
CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections
Submitted by grigby1 on Wed, 10/23/2019 - 12:38pm
revoked certificates checking
log-based schemes
Metrics
Monitoring
Protocols
pubcrawl
public key cryptography
query processing
resilience
Resiliency
log servers
Scalability
Security analysis
Servers
SSL connections
SSL Trust Models
system monitoring
telecommunication security
TLS connections
data consistency
blockchain system
blockchain-based public
Certchain
certificate audit service
certificate forward traceability
certificate revocation checking
certificate revocation mechanisms
certification
Cryptographic Protocols
auditing
data privacy
data structure
data structures
DCBF
dependability-rank based consensus protocol
dual counting bloom filter
Electronic mail
Human behavior
biblio
Embedding Non-Compliant Nodes into the Information Flow Monitor by Dependency Modeling
Submitted by grigby1 on Mon, 08/26/2019 - 11:06am
Information Flow Monitor approach
unalterable blackbox nodes
system monitoring
semantic dependencies
Scalability
Resiliency
resilience
pubcrawl
program debugging
noncompliant nodes
network node
multiple hops
Monitoring
Metrics
Compositionality
information flow monitor
IFM protocol
Human Factors
Human behavior
heterogeneous networks
distributed computing
dependency structures
dependency modeling
cyber-physical systems
cyber physical systems
Cyber Dependencies
CPS
Conferences
« first
‹ previous
1
2
3
4
next ›
last »