Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Libraries
biblio
CAG: Compliance Adherence and Governance in Software Delivery Using Blockchain
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
SDLC
License verification
Licenses
litigations
metadata
noncomplaint license software
nonconformant behavior
open source components
open-source software components
Policy Based Governance
pubcrawl
public domain software
Libraries
security risks
smart contracts
Software
software delivery
software development life cycle
software development management
software engineering
standard compliances
technical challenges
vulnerability assessment
decentralized CAG
blockchain
blockchain technologies
building software
client industry
collaboration
compliance adherence and governance
compliance specifications
contracts
copyright issues
Crowd Sourcing
cryptocurrencies
auditing
development activities
disparate sources
distributed teams
economic challenges
extraordinary amounts
functional specifications
geographically distributed teams
Global Software Development
legislation
level agreements
biblio
Prototype Container-Based Platform for Extreme Quantum Computing Algorithm Development
Submitted by aekwall on Mon, 03/30/2020 - 11:41am
Docker container environment
quantum computing security
rapid prototype development
quantum simulators
quantum computing hardware platforms
quantum computing devices
quantum computing algorithm development
quantum computer
Qiskit source codes
prototype environment
prototype container-based platform
prototype container system
prototype container based system
IBM Q Experience Web site
IBM Q Experience
Docker Containers
Cloud Computing
computer security challenges
cloud computing system
cloud computing software environment
Prototypes
Predictive Metrics
quantum computing
Containers
source code (software)
Libraries
composability
pubcrawl
Resiliency
Software
Hardware
Scalability
biblio
QRStream: A Secure and Convenient Method for Text Healthcare Data Transferring
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
cyber physical systems
text healthcare data transferring
QRStream
healthcare organization
healthcare activities
health information
health data delivery
health awareness
electronic health data transferring
privacy problems
QR codes
health care
Payloads
security problems
security of data
text analysis
Libraries
metadata
Decoding
Cryptography
pubcrawl
Resiliency
Organizations
Medical services
electronic health records
data privacy
Servers
biblio
CapExec: Towards Transparently-Sandboxed Services
Submitted by grigby1 on Fri, 03/27/2020 - 11:37am
tools
collaboration
security
pubcrawl
policy-based governance
composability
Runtime
Libraries
Memory management
application security
Capsicum
Cats
compartmentalization
Containers
sandboxing
service manager
biblio
SafeCheck: Safety Enhancement of Java Unsafe API
Submitted by grigby1 on Fri, 03/27/2020 - 11:29am
Resiliency
memory safety
Metrics
openJDK bug system
policy-based governance
program debugging
Programming Language
pubcrawl
resilience
Memory Protection
Runtime
Safe Coding
Safety
safety enhancement
security of data
storage management
tools
unsafe crash patterns
Java core library
bytecode
bytecode verification
collaboration
Computer bugs
dynamic analysis
Human behavior
Human Factors
Java
application program interfaces
Java runtime
Java unsafe API
JVM crash
Libraries
low- level system code
Memoey Safety
memory checker
biblio
Defending against ROP Attacks with Nearly Zero Overhead
Submitted by grigby1 on Mon, 03/23/2020 - 3:58pm
Training
Monitoring
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
composability
Runtime
Libraries
Memory management
programming
static analysis
rop attacks
biblio
Preservation System for Scientific Experiments in High Performance Computing: Challenges and Proposed Concept
Submitted by aekwall on Mon, 03/16/2020 - 10:41am
Scientific Computing Security
scientific experiment
research experiments preservation
research experiments
research data management
preservation system
preservation process
HPC system
HPC computations
HPC
future reproduction
created experiment
containerization
computing system
case preservation
operating systems
security of data
High performance computing
Compositionality
reproducible research
Predictive Metrics
resilience
parallel processing
Containers
knowledge based systems
Libraries
internet
pubcrawl
operating system
Hardware
Servers
biblio
Hardware Trojans Detection at Register Transfer Level Based on Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 4:37pm
Libraries
Trojan horses
trojan horse detection
training database
Training
supply chain security
source code (software)
shift registers
server-client mechanism
RTL source codes
Resiliency
resilience
register transfer level
pubcrawl
machine-learning-based detection method
circuit features extraction
learning (artificial intelligence)
invasive software
integrated circuits design process
Integrated circuit modeling
integrated circuit design
Hardware Trojans library
Hardware Trojans detection
Hardware
flip-flops
feature extraction
electronic engineering computing
database management systems
cyber physical systems
biblio
CFI: Control Flow Integrity or Control Flow Interruption?
Submitted by aekwall on Mon, 02/24/2020 - 11:01am
return oriented programming
malicious code injection
modern Code Reuse Attacks
Monitoring
object-oriented programming
Payloads
programming
pubcrawl
Resiliency
Libraries
return-oriented programming
Runtime
runtime attacks
runtime memory vulnerabilities
Scalability
security of data
target system
rop attacks
Jump-Oriented Programming
interrupt requests
Human Factors
famous attack paradigms
execution flow
data flow analysis
data execution prevention
corrupt code pointers
control-flow integrity
Control Flow Integrity
computer security
composability
CFI-based defenses
CFI solutions
C++ languages
biblio
FIoT: Detecting the Memory Corruption in Lightweight IoT Device Firmware
Submitted by aekwall on Mon, 01/20/2020 - 12:13pm
library function identification approach
dynamic analysis framework
dynamic analysis techniques
embedded firmware source code
FIoT framework
firmware analysis
firmware images
fuzzing
fuzzing test
hardware architectures
IoT device operating systems
IoT industry
CFG recovery approach
lightweight IoT device firmware images
lightweight IoT firmware
memory corruption
memory corruption vulnerabilities
Microprogramming
Program slicing
security researchers
time 170.0 s
time 210.0 s
time 40.0 s
zero trust
firmware
Scalability
Internet of Things
security
performance evaluation
system monitoring
Resiliency
pubcrawl
policy-based governance
program testing
Libraries
static analysis
computer network security
program diagnostics
Human Factors
operating systems (computers)
program compilers
Loading
lightweight IoT devices
address determination analysis
backward slice approach
binary code snippets
Binary codes
binary firmware
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »