Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Java
biblio
Comprehensive Java Metadata Tracking for Attack Detection and Repair
Submitted by grigby1 on Mon, 03/15/2021 - 1:09pm
Java
software safety
Resiliency
resilience
pubcrawl
Metrics
metadata
maintenance engineering
Libraries
arrays
Intrusion Detection
Instruments
Containers
computer security
Computer errors
composability
command injection attacks
biblio
Security across abstraction layers: old and new examples
Submitted by aekwall on Mon, 03/15/2021 - 12:08pm
Context modeling
successive layers
source programming language
source code level
single level
ISA
Instruction Set Architecture
ICT system
ICT application
higher level abstractions
cross-layer security issues
cross-layer nature
cross-layer issues
abstraction layers
operating systems
security
compiler security
secure compilation
Computer languages
program compilers
Instruction sets
Compositionality
security issues
Java
Metrics
pubcrawl
Resiliency
Hardware
Scalability
security of data
biblio
CheckMyCode: Assignment Submission System with Cloud-Based Java Compiler
Submitted by aekwall on Mon, 03/15/2021 - 12:08pm
Java cloud based programming compiler
portability
assignment management system
CheckMyCode system
cloud based Java compiler
cloud compiler
Cloud System
computer science and engineering curriculum
educational courses
computer aided instruction
Java programming
learning system
mobile learning
PC browser
programming assignment submission system
programming language learning
smart device browser
Java
Scalability
programming
Task Analysis
Program processors
Resiliency
pubcrawl
Metrics
computer science education
Cloud Computing
Multimedia systems
Writing
Compositionality
program compilers
programming languages
compiler security
smart devices
biblio
Biometric System of Access to Information Resources
Submitted by aekwall on Tue, 03/09/2021 - 11:57am
internet
webhost web server
web resource
unauthorized access
structural schematic diagram
software and hardware complex
Scalability
Resiliency
pubcrawl
phpMyAdmin database server
PHP scripting language
personal data
online front-ends
Metrics
JavaScript
Java
biometric encryption
information resourses
information resources
information resource
Identification
hypermedia markup languages
HTML hypertext markup language
hardware complex
Google Chrome extension
fingerprint
embedded scripts
developed complex
C language
biometric system
authorisation
authoring languages
biblio
A Modified Tiny Asymmetric Encryption for Secure Ftp to Network
Submitted by aekwall on Mon, 01/25/2021 - 12:56pm
client-server systems
server-client innovation
secure FTP
secret key verification
modified tiny asymmetric encryption
Asymmetric Encryption
file transfer protocol
Elliptic curve cryptography
Java
Servers
Metrics
Protocols
composability
pubcrawl
Human behavior
Resiliency
private key cryptography
encryption
biblio
JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets
Submitted by grigby1 on Wed, 01/20/2021 - 4:21pm
proprietary manufacturer-specific APIs
low-level cryptographic primitives
memory footprint
nondisclosure agreements
open code sharing
open library
open systems
open-source development
open-source licenses
optimisation
optimization
proprietary APIs
low-level cryptographic operations
pubcrawl
public domain software
resilience
Resiliency
resource-constrained platforms
smart cards
smartcards
software libraries
standards
transparency
wrapper cryptographic library
Elliptic curves
APIs
application program interfaces
application programming interface
auditability
Big Integers
certification
certification transparency
Compositionality
Cryptography
data types
elliptic curve operations
API
generic library
Hardware
interoperability
Java
JavaCard
JavaCard API
JavaCard applets
JavaCard multiapplication platform
JCMathLib
Libraries
biblio
CryptoExplorer: An Interactive Web Platform Supporting Secure Use of Cryptography APIs
Submitted by grigby1 on Wed, 01/20/2021 - 4:20pm
interactive systems
software engineering
security
Resiliency
resilience
pubcrawl
online information sources
Java Cryptography Architecture
Java
internet
interactive Web platform
API
Data mining
Cryptography
cryptographic APIs
CryptoExplorer
Compositionality
code analysis
application programming interface
application program interfaces
APIs
biblio
A Study on Analytical Visualization of Deep Web
Submitted by grigby1 on Fri, 01/15/2021 - 12:22pm
deep Web visualization
visualization
unknown dark channels
Tors encryption client
security
search engines
pubcrawl
Java
internet
Human Factors
Human behavior
Google
drugs
analysis
deep web
Databases
Data visualization
data visualisation
dark web
Cryptography
Crime Trace
crime monitoring
crime management
crime information visual system
Computer crime
biblio
Raw Cardinality Information Discovery for Big Datasets
Submitted by grigby1 on Fri, 12/11/2020 - 3:00pm
HDFS
back-end Big Data systems
Big Data sets
Cardinality
data separation
elastic
elasticsearch
events
grafana
Pipelines
Java
logs
Map Reduce
parallel discovery data store infrastructure
raw cardinality information discovery
rocksdb
search queries
Metadata Discovery Problem
Cloud Computing
Data mining
Monitoring
pubcrawl
Metrics
resilience
Resiliency
Conferences
Scalability
data analysis
Topology
Big Data
metadata
microsoft windows
Measurement
Compositionality
query processing
Hadoop
biblio
ScriptNet: Neural Static Analysis for Malicious JavaScript Detection
Submitted by aekwall on Mon, 11/30/2020 - 12:03pm
LSTM
Internet-scale Computing Security
sequential processing layers
ScriptNet system
Privacy-invasive software
preinformant learning
PIL model
neural static analysis
Neural models
neural malicious JavaScript detection
JavaScript files
Internet-scale processing
discriminative training
computer infection threat vector
policy governance
deep learning model
malware
deep learning
program diagnostics
Java
Vectors
machine learning
Neural networks
neural nets
Metrics
malware detection
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
invasive software
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »