Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Libraries
biblio
An object-oriented open software architecture for security applications
Submitted by grigby1 on Thu, 06/07/2018 - 3:01pm
public key cryptography
Universal Serial Bus
Software Architecture
Software
smart cards
security of data
security device
security applications
security APIs
security
secure messaging
secure communication
SEcube™ platform
Resiliency
resilience
application program interfaces
pubcrawl
Pins
Open Hardware security platform
object-oriented open software architecture
object oriented security
multiplatform Open Source security framework
Metrics
Libraries
Hardware
field programmable gate arrays
dedicated Open Hardware devices
Data protection
CPU
composability
biblio
Comparing the Usability of Cryptographic APIs
Submitted by K_Hooper on Wed, 05/09/2018 - 11:00am
GitHub
Usable Security
usability
symmetric cryptography
software libraries
Security by Default
Scalability
Resiliency
Python developers
pubcrawl
programming
Libraries
Guidelines
API usability
documentation accessibility
documentation
cryptography errors
Cryptography
cryptographic library
cryptographic application programming interfaces
cryptographic API usability
controlled experiment
code security
auxiliary features
application program interfaces
biblio
An Experimental Study of Four Methods for Homology Analysis of Firmware Vulnerability
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
Libraries
vulnerability detection
vulnerabilities
tools
third-party libraries
string matching
string feature matching
security
Resiliency
public domain software
pubcrawl
power grid vulnerability analysis
normalized compression distance
Microprogramming
Metrics
Binary difference analysis
Internet of Things
Human behavior
homology analysis
fuzzy set theory
fuzz hash
firmware vulnerability
firmware
File systems
file organisation
feature extraction
embedded device
development kits
Compositionality
code reuse
biblio
Hidden Process Detection for Windows Operating Systems
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
opened windows based method
Windows operating system
user mode
system call based method
software development
security of data
security
rootkit
Resiliency
resilience
pubcrawl
PID based method
operating system kernels
audit system
monitoring system
Monitoring
Microsoft Windows (operating systems)
Metrics
Libraries
information security monitoring
Indexes
hidden process detection
descriptor based method
data encapsulation
Computational efficiency
composability
biblio
Evaluation of a Formalized Encryption Library for Safety-Critical Embedded Systems
Submitted by grigby1 on Tue, 02/27/2018 - 2:28pm
safety leveraged implementation of data encryptio
optimisation
optimization
programming languages
pubcrawl
public key cryptography
public-key based encryption
resilience
Resiliency
resource restricted embedded safety devices
Safety
model based language
safety leveraged implementation of data encryption
safety-critical embedded systems
safety-critical infrastructure
safety-critical software
Scade
security architecture multiple independent levels
SLIDE library
Software
synchronous dataflow language optimization
train control safety application
embedded systems
authentication
complex safety-critical devices
composability
confidentiality
Cryptographic Protocols
cryptography implementations
data integrity
demilitarized zones
dependable communication
diverse integration patterns
Air gaps
encrypting gateways
encryption
formalized encryption library evaluation
Human behavior
Human Factors
infamous air gap
integrity
Libraries
Metrics
biblio
Droidrevealer: Automatically detecting Mysterious Codes in Android applications
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Libraries
undetectable codes
smart phones
Sensitive Behavior
Scalability
Resiliency
resilience
pubcrawl
Mysterious Codes
Metrics
malware detection
malware
malicious code snippets
android
invasive software
Humanoid robots
Human Factors
Human behavior
encryption
Droidrevealer
Decrypt
Decode
Androids
Android malware
android encryption
Android (operating system)
biblio
CrackDex: Universal and automatic DEX extraction method
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
invasive software
virtual machines
universal unpacking system
universal DEX extraction
smart phones
simulation execution
security of data
Scalability
Resiliency
resilience
pubcrawl
mobile computing
Metrics
Manuals
Libraries
Android (operating system)
Humanoid robots
Human Factors
Human behavior
encryption
DEX restoration
DEX reassembling
DEX packing
CrackDex
automatic DEX extraction
app
antivirus software
Androids
android encryption
Android application packing
biblio
Secure Tera-scale Data Crunching with a Small TCB
Submitted by grigby1 on Tue, 01/16/2018 - 6:22pm
Outsourced Database Integrity
virtual storage
virtual memory
trusted hardware
trusted computing base
Trusted Computing
tera-scale data crunching
self-contained services
security of data
secure virtual memory
secure execution
Resiliency
pubcrawl
Cloud Computing
Metrics
Memory management
Libraries
LASTGT system
large-scale data
large state on a generic trusted component
Intel SGX
hypervisor
Hardware
data handling
Cryptography
composability
biblio
Ensuring information security by using Haskell's advanced type system
Submitted by grigby1 on Wed, 01/10/2018 - 12:18pm
pubcrawl
Resiliency
composability
Software
Libraries
Computer languages
Lattices
compiler security
biblio
Performance challenges for heterogeneous distributed tensor decompositions
Submitted by grigby1 on Thu, 12/28/2017 - 1:17pm
pubcrawl
MPI
multi-threading
multidimensional arrays
OpenMP threads
parallel factorization
parallel processing
parallel programming
parallelization
performance evaluation
Metrics
ReFacTo
Signal processing algorithms
Sparse matrices
sparse matrix-vector multiplications
SpMV
Tensile stress
tensor decomposition
tensors
graphics processing units
canonical decomposition
Compositionality
CP-ALS
cuSPARSE library
decomposition
DeFacTo
distributed memory
distributed memory systems
gpu
alternating least squares fitting
heterogeneous distributed tensor decompositions
large-scale data analytics
Least squares approximations
Libraries
math kernel library
Matrix decomposition
matrix multiplication
message passing
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »