Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software tools
biblio
Attack Modeling and Verification for Connected System Security
Submitted by aekwall on Wed, 05/01/2019 - 1:05pm
SysML connectivity profile
pubcrawl
Resiliency
security
security of data
Software Architecture
software tools
static system modeling
SysML
program verification
system security specifications
system specifications
system validation
system verification
systems engineering
Systems modeling
Temporal Logic
Unified modeling language
error propagation
Attack Modeling
composability
connected system security
critical systems
dynamic system modeling
Dynamical Systems
embedded systems
error detection
Adaptation models
extended attack tree
Formal Specification
IoT
Metrics
model checker
model checking
Petri nets
program diagnostics
biblio
FP -TESTER : Automated Testing of Browser Fingerprint Resilience
Submitted by grigby1 on Fri, 04/05/2019 - 10:27am
Browser Security
testing toolkit
software tools
privacy leaks
FP-TESTER
browser vendors
browser tracking
browser fingerprint resilience
Automated Testing
Resiliency
Statistics
Sociology
program testing
Compositionality
privacy
Fingerprint recognition
Browser Fingerprinting
online front-ends
Entropy
Browsers
Metrics
Human behavior
pubcrawl
resilience
testing
security of data
data privacy
internet
biblio
Securing Concurrent Lazy Programs Against Information Leakage
Submitted by grigby1 on Thu, 08/23/2018 - 11:57am
information-flow control tools
concurrency control
Agda proof assistant
concurrent lazy programs security
covert channel
functional languages
functional programming
Haskell libraries
IFC libraries
IFC tools
Information Leakage
lazy calculus
lazy evaluation
lazy languages
lazyDup
Message systems
noninterference
security library MAC
software libraries
Writing
data structures
Theorem Proving
Haskell
Concurrency
cyber-physical systems
pubcrawl
composability
security of data
data privacy
Sensitivity
security
program diagnostics
resilience
Metrics
Libraries
Lattices
timing
Resiliency
software tools
biblio
Identifying and Documenting False Positive Patterns Generated by Static Code Analysis Tools
Submitted by grigby1 on Thu, 06/07/2018 - 3:12pm
public domain software
warning message
tools
system documentation
static code analysis tools
static code analysis
software tools
software engineering
security
Resiliency
resilience
commercial tool
pubcrawl
program diagnostics
open-source tools
Open Source Software
Human behavior
false positive pattern identification
false positive pattern documentation
Context
Conferences
composability
biblio
S2F: Discover Hard-to-Reach Vulnerabilities by Semi-Symbolic Fuzz Testing
Submitted by K_Hooper on Wed, 04/04/2018 - 9:58am
program testing
vulnerability detection tools
vulnerability detection
tools
test case generation
Symbolic Execution
Software Vulnerability
software tools
semisymbolic fuzz testing
Resiliency
pubcrawl
Prototypes
Binary Analysis
path explosion
Metrics
low frequency input
Human behavior
hard-to-reach vulnerabilities
fuzzy set theory
Fuzz Testing
fuzzing
Explosions
Computer bugs
Compositionality
biblio
Software-Design for Internal Security Checks with Dynamic Integrity Measurement (DIM)
Submitted by grigby1 on Tue, 02/06/2018 - 1:58pm
security software tools
internal security checks
Kernel
kernel architecture
Linux
malicious components
Memory management
memory measurment
multiple related components
pubcrawl
Resiliency
integrity measurement architecture
software design
Software measurement
software tools
system components
system state verification
TCG
The Concise Binary Object Representation (CBOR)
Trusted Platform Module (TPM)
trusted platform modules
DIM
attestation operations
binary code
Binary codes
central components
complex attestation strategies
composability
cooperation project
cryptographic hashes
Cryptography
data integrity
Aerospace electronics
DRA
dynamic integrity measurement
Dynamic Runtime Attestation
extensibility
extensible architecture
flexibility
flexible architecture
Guidelines
IMA
biblio
FairTest: Discovering Unwarranted Associations in Data-Driven Applications
Submitted by K_Hooper on Fri, 02/02/2018 - 11:02am
machine learning algorithms
Algorithmic Fairness
algorithmic fairness formalization
Computer bugs
data analysis
Data collection
data privacy
data-driven applications
debugging capabilities
Decision Making
decision-making
fairness metrics
FairTest
Google
unwarranted association discovery
Measurement
Medical services
Metrics
Predictive Metrics
program debugging
pubcrawl
sensitive user attributes
software tools
Statistics
Systems
testing
tools
UA framework
biblio
A model for the analysis of security policies in service function chains
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
pubcrawl
virtualisation
Virtual private networks
software tools
software defined networking
Software
SFC
service function chains
Security Policies Analysis
security policies
SDN
Ad hoc networks
program verification
policy-based governance
NFV
network function virtualization
Monitoring
formal model
Cryptography
computer network security
collaboration
Analytical models
biblio
High performance computation tools for real-time security assessment
Submitted by BrandonB on Thu, 04/30/2015 - 2:19pm
software tools
power system
power system security
power system transient stability
power transmission control
predictor-corrector methods
proactive operator decision-support
SCADA
SCADA systems
security assessment
power engineering computing
sparse linear solver
SuperLU_MT library
synchrophasor measurement data
system control actions
thread-parallelization
transient stability analysis
transmission operators
U.S. Department of Energy grant
EPRI
computation tools
computer software
computing machine
contingency analysis
CPU time
data visualisation
DE-OE0000628
Decision Making
dynamic simulation software
Adams-Bashforth-Moulton predictor-corrector method
ETMSP performance
extended transient midterm simulation program
hybrid measurement-based-simulation-based security-assessment tool
hybrid simulation-measurement-based tools
integration
MPI-based parallelization
operation security risk
phasor measurement
« first
‹ previous
1
2