Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Systematics
biblio
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach
Submitted by aekwall on Tue, 04/27/2021 - 1:11pm
security
Software
Bayes methods
cyber-physical systems
Resiliency
pubcrawl
vulnerabilities
Topology
Scalability
Software algorithms
Systematics
security risk assessment
attack graphs
belief networks
Bayesian networks
Probabilistic Graphical Models
biblio
Software architecture for the application of facial recognition techniques through IoT devices
Submitted by aekwall on Tue, 03/09/2021 - 11:58am
neural network
Transportation
Systematics
Software measurement
software architecture proposal
Software Architecture
Software
security of data
Scalability
Resiliency
pubcrawl
process control
personal data
biometric encryption
Metrics
IoT devices
Internet of Things
feature extraction
facial recognition time
facial recognition techniques
facial recognition
face recognition
encryption
data privacy
biometrics (access control)
Big Data
biblio
MinerRay: Semantics-Aware Analysis for Ever-Evolving Cryptojacking Detection
Submitted by grigby1 on Wed, 02/10/2021 - 1:12pm
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Cryptography
Runtime
Browsers
Semantics
Systematics
Hash functions
Focusing
cryptomining
cryptojacking
Webassembly
biblio
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps
Submitted by grigby1 on Thu, 01/28/2021 - 1:33pm
Resiliency
mHealth apps
mobile computing
patient monitoring
personal data
privacy
Privacy Policies
Privacy Policy
privacy protection
pubcrawl
resilience
Metrics
Scalability
security
security of data
Semantics
sensitive data
severe privacy issues
severe privacy threats
software reliability
step-by-step guidelines
Systematics
Data protection
Android apps
Android mHealth
app code
app implementations
app privacy policy
app users
data collections
data flow
data practices
data privacy
android encryption
Data Transmission
GDPR
GDPR compliance violations
GDPR lists general rules
General Data Protection Regulation
GUI
Human behavior
medical computing
medical information systems
biblio
Requirements Patterns Structure for Specifying and Reusing Software Product Line Requirements
Submitted by aekwall on Mon, 11/09/2020 - 1:14pm
requirement engineering activities
Information Reuse and Security
SRP structure
SPLE
software requirement pattern structure
software product lines
software product line requirements
Software Product Line Engineering
software development phases
software artifacts
Requirements Reuse
requirements patterns structure
Requirements Patterns
security
RePa requirements pattern template
systems analysis
documentation
Systematics
formal verification
Compositionality
Proposals
Formal Specification
Unified modeling language
pubcrawl
Resiliency
Software
biblio
Cybersecurity Education: From Beginners to Advanced Players in Cybersecurity Competitions
Submitted by grigby1 on Wed, 11/04/2020 - 1:43pm
security of data
learning needs
motivation
National Cyber League competition
novice players
player feedback
player interests
privacy
pubcrawl
Interviews
student engagement
systematic training
Systematics
Task Analysis
team game
tools
Training
undergraduate students
cybersecurity competition
advanced players
capture-the-flag type tasks
college-level cybersecurity competition
computer aided instruction
computer science education
computer security
confidence level
cyber physical systems
active learning
cybersecurity concepts
cybersecurity education
Educational institutions
Games
Human Factors
human-subject study
individual games
biblio
HashTag Erasure Codes: From Theory to Practice
Submitted by grigby1 on Mon, 11/02/2020 - 11:40am
Scalability
maintenance engineering
MDS erasure codes
minimum-storage regenerating codes
MSR constructions
pubcrawl
Reed-Solomon codes
regenerating codes
repair-bandwidth
lowest data-read
single and multiple failures
small sub-packetization level
storage management
storage overhead
sub-packetization level
Systematics
Twitter
access-optimal
input-output programs
i/o systems security
I/O operations
i-o systems security
HTECs
high-rate MDS codes
hashtag sign
HashTag erasure codes
Hadoop
encoding
distributed storage
Distributed databases
data analysis
code construction
Bandwidth
biblio
On Learning in Collective Self-Adaptive Systems: State of Practice and a 3D Framework
Submitted by aekwall on Mon, 10/12/2020 - 11:31am
multifaceted analysis
3D framework
adaptive systems
agent-specific goals
collective self-adaptive systems
CSAS applications
Distributed Sensing
environmental data collection
learning techniques
Interconnected Systems
multiple agents
privacy-aware mechanisms
search and rescue operations
self-adaptive systems
system-wide goals
taxonomy
Expert Systems and Privacy
Scalability
learning
Autonomic systems
Systematics
Gold
distributed systems
Human Factors
integrated circuits
Decision Making
Databases
multi-agent systems
pubcrawl
Human behavior
learning (artificial intelligence)
Conferences
data privacy
biblio
WASPP: Workflow Automation for Security Policy Procedures
Submitted by aekwall on Mon, 08/24/2020 - 12:41pm
organisational aspects
workflow automation
WASPP
University networks
tools
Systematics
suspicious event
SoC
security policy procedures
Security Operations Center
security of data
pubcrawl
Pipelines
Information Reuse and Security
Monitoring
information security specialists
human intuition
generalized event response solutions
composability
automation
Automated Response Actions
automated event response solutions
administrative policies
ad hoc solutions
Resiliency
Compositionality
biblio
Towards Systematic Design of Collective Remote Attestation Protocols
Submitted by aekwall on Mon, 08/17/2020 - 11:37am
Systematics
untrusted device
towards systematic design
Systematic Design
single-device RA
single device
remote exploits
prior collective RA schemes
place collective RA
networked embedded devices
embedded system security
concrete collective RA scheme
collective remote attestation protocols
Collective Remote Attestation
remote device
data privacy
malware detection
Topology
composability
pubcrawl
Human behavior
Resiliency
embedded systems
Software
Protocols
performance evaluation
security
Hardware
attestation
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »