Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software fault tolerance
biblio
Models of Reliability of Fault-Tolerant Software Under Cyber-Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 12:59pm
Software
on-demand software
Probabilistic logic
probabilistic model
pubcrawl
resilience
Resiliency
Scalability
security of data
noncompromised software
software fault tolerance
software fault-tolerance
software maintenance
software maintenance policies
software reliability
sophisticated synchronized attacks
synchronized attacks system reliability
telecommunication security
fault tolerant architecture
adversary
Adversary Models
computer security
cyber-attacks
cyber-security controls
diverse software
failure regions
fault tolerance
adequate adversary model
Fault tolerant systems
fault-tolerant software
Human behavior
independent attacks
industrial control applications
industrial protection systems
Metrics
biblio
Using TLA+ in the Development of a Safety-Critical Fault-Tolerant Middleware
Submitted by grigby1 on Tue, 02/06/2018 - 12:58pm
safety-critical software
railway safety
railways
Redundancy
Resiliency
safety integrity level 4
safety-critical fault-tolerant middleware
safety-critical industries
safety-critical modules
railway control applications
Software Architecture
software fault tolerance
software quality
software quality metrics
TAS Control Platform
TLA+
trusted platform modules
formal methods
C code
C language
Code Generation
complex algorithms
composability
distributed algorithms
Fault tolerant systems
fault-tolerant distributed algorithms
Algorithm design and analysis
Formal Specification
formal verification
middleware
model checking
property-driven design
pubcrawl
rail traffic control
biblio
Cost sensitive moving target consensus
Submitted by grigby1 on Thu, 12/28/2017 - 12:21pm
IDS signal
TV
Switches
state machine replication
software fault tolerance
security of data
Resiliency
pubcrawl
Protocols
network vulnerability
moving target defense
moving target consensus
intrusion tolerance
intrusion detection system signal
Analytical models
fault-tolerant service
Fault tolerant systems
fault tolerance
crash fault tolerant protocol
crash fault tolerance
Consensus
Computer crashes
composability
CFT protocol
Byzantine fault tolerant protocol
Byzantine Fault Tolerance
BFT protocol
biblio
Enabling Risk Management for Smart Infrastructures with an Anomaly Behavior Analysis Intrusion Detection System
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
IoT infrastructures security
threat model
software fault tolerance
smart infrastructures
sensors
security of data
Scalability
risk management method
risk management framework
risk management
Resiliency
pubcrawl
mobile devices
mobile computing
Metrics
ABA methodology
IoT
intrusion tolerance
intrusion detection system
Intrusion Detection
Internet of Things
cybersecurity mechanism
cyber security
computer security
Computational modeling
Autonomic Security
Autonomic computing
Anomaly Behavior Analysis methodology
anomaly behavior analysis
biblio
AnomalyDetect: Anomaly Detection for Preserving Availability of Virtualized Cloud Services
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
Kalman filter
virtualized cloud services
Virtual machining
virtual machines
Time series analysis
software fault tolerance
security of data
Scalability
Resiliency
pubcrawl
potential anomalies forecasting
Monitoring
Metrics
Live Migration of Virtual Machines
live migration
Kalman filters
Anomaly Detection
interconnected virtual machines
Intelligent systems
historical data
Detectors
cloud services migration
cloud services
Cloud Security
cloud disruption
Cloud Computing
Autonomic Security
Autonomic Cloud Security
autonomic cloud availability
AutoMigrate framework
AnomalyDetect approach
biblio
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm
Submitted by grigby1 on Mon, 11/27/2017 - 11:06am
finite field
vigilant periodic sequence algorithm
software reliability
software fault tolerance
security perspectives
scalar multiplication algorithm
scalar multiplication
Resiliency
public key cryptography
pubcrawl
physical attacks
Metrics
Algorithm design and analysis
fault injection attack
Fault Attacks
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature algorithm
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECDSA
digital signatures
composability
Circuit faults
biblio
Towards more accurate multi-label software behavior learning
Submitted by BrandonB on Wed, 05/06/2015 - 1:34pm
modern software system
Training
software vendor
software maintenance
software fault tolerance
Software Behavior Learning
Software algorithms
Software
public domain software
Prediction algorithms
open source programs
multilabel software behavior learning
Multi-label Learning
Baidu
MLL-GA
Ml.KNN
learning (artificial intelligence)
genetic algorithms
genetic algorithm
fault labels
F-measures
execution trace
crash report
Computer crashes
Biological cells
biblio
Multidimensional Diversity Employment for Software Behavior Encryption
Submitted by BrandonB on Wed, 05/06/2015 - 8:54am
multidimensional software diversity employment
system resilience
System recovery
spatiotemporal software behavior encryption
Spatiotemporal phenomena
software monoculture
software fault tolerance
Software
security provisioning
security level
Runtime
resilience
online programmable software-execution foundation separating logic
multidimensional systems
autonomic failure recovery mechanism
moving target defense
encryption
Employment
diffusion levels
Cryptography
confusion levels
computational cost
computational complexity
ChameleonSoft recovery mechanisms
ChameleonSoft Behavior Encryption
CBE mechanism
behaviorally-mutated functionally-equivalent code variants
avalanche effect percentage
biblio
Multidimensional Diversity Employment for Software Behavior Encryption
Submitted by BrandonB on Tue, 05/05/2015 - 10:22am
multidimensional software diversity employment
system resilience
System recovery
spatiotemporal software behavior encryption
Spatiotemporal phenomena
software monoculture
software fault tolerance
Software
security provisioning
security level
Runtime
resilience
online programmable software-execution foundation separating logic
multidimensional systems
autonomic failure recovery mechanism
moving target defense
encryption
Employment
diffusion levels
Cryptography
confusion levels
computational cost
computational complexity
ChameleonSoft recovery mechanisms
ChameleonSoft Behavior Encryption
CBE mechanism
behaviorally-mutated functionally-equivalent code variants
avalanche effect percentage
biblio
Autonomic Resilient Cloud Management (ARCM) Design and Evaluation
Submitted by BrandonB on Tue, 05/05/2015 - 10:21am
ARCM
autonomic resilient cloud management
behavior obfuscation
BO
Cloud Computing
cloud service behavior obfuscation
cloud system security
Conferences
moving target defense
Resiliency
security of data
software fault tolerance
« first
‹ previous
1
2
3
4
next ›
last »