Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sockets
biblio
Network Transparent Decrypting of Cryptographic Stream Considering Service Provision at the Edge
Submitted by grigby1 on Mon, 04/25/2022 - 2:24pm
Cloud Computing
pubcrawl
resilience
Resiliency
performance evaluation
Scalability
Cryptography
Protocols
Switches
edge computing
parallel processing
sockets
deep packet inspection
encrypted stream decryption
network transparency
Secure Sockets Layer
biblio
Intelligent Notification System for Large User Groups
Submitted by grigby1 on Fri, 02/25/2022 - 12:35pm
security
Servers
pubcrawl
policy-based governance
collaboration
Databases
composability
real-time systems
programming
middleware security
sockets
Customer Information Control System
Intelligent Notification System
Message Notification
System testing
biblio
Automatic Generation of Different Malware
Submitted by grigby1 on Mon, 02/07/2022 - 3:43pm
Payloads
mobil malware
malware static analysis
malware dynamic analysis
automated malware generation
software development management
Malware Analysis
malware dataset
sockets
malware
privacy
static analysis
programming
internet
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
A Dynamic Multi-Threaded Queuing Mechanism for Reducing the Inter-Process Communication Latency on Multi-Core Chips
Submitted by grigby1 on Thu, 09/30/2021 - 10:08am
Resiliency
Linux
Lock-free
Message systems
Metrics
multicore computing security
Multi-cores
pubcrawl
Queueing
resilience
latency
Scalability
sockets
Synchronization
Libraries
Concurrent computing
Eventcounts
FAA
Fetch-and-add
biblio
Trustful: A Decentralized Public Key Infrastructure and Identity Management System
Submitted by grigby1 on Thu, 05/20/2021 - 11:36am
internet
web of trust
sockets
smart contracts
smart contract
security
resilience
Public key
pubcrawl
PKI
PKI Trust Models
identity management systems
Identity management
decentralized PKI
composability
blockchain
Metrics
Human behavior
Scalability
Resiliency
biblio
A Systematic Way to Implement Private Tor Network with Trusted Middle Node
Submitted by grigby1 on Tue, 04/27/2021 - 1:15pm
Metrics
trustworthiness
Trusted Middle Node
trust
sockets
Servers
Resiliency
resilience
Random access memory
pubcrawl
Private Tor Network (PTN)
Physical Free Memory
Web Browser Security
Live Tor Network (LTN)
IP networks
Human behavior
Free CPU Time
Cryptography
CpuCount
CPU Percentage
Compositionality
Central Processing Unit
Browsers
Browser Security
biblio
MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware
Submitted by grigby1 on Fri, 08/14/2020 - 10:44am
orthogonal defense
global malware operations
law enforcement agencies
MALPITY
malware authors
malware families
malware spreading
malware tarpits
monetization techniques
command and control systems
POSIX
Sinkholing
Socket API
Tarpit
tarpit vulnerabilities
Unix
Winsock socket APIs
application programming interface
Dynamic Malware Analysis
Servers
pubcrawl
resilience
Resiliency
malware
invasive software
APIs
application program interfaces
Engines
Compositionality
network service
network operation
botnet
sockets
Grippers
botnet infrastructures
botnets
biblio
Empirical Performance Evaluation of QUIC Protocol for Tor Anonymity Network
Submitted by grigby1 on Thu, 08/13/2020 - 4:34pm
Multiplexing
transport protocols
transport design
Tor transport layer
Tor anonymity network
Tor
QUIC protocol
QUIC
Performance
onion routers
head-of-line blocking problem
handshaking delays
Google protocol
empirical performance evaluation
Anonymity Network
sockets
security
Relays
anonymity
Metrics
public domain software
Kernel
delays
composability
Protocols
internet
data privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
Design of APT Attack Defense System Based on Dynamic Deception
Submitted by grigby1 on Fri, 08/07/2020 - 2:58pm
dynamic IP address generation method
advanced persistent threat attack
APT attack defense system
APT defense system framework
deception defense process
defense APT attacks
defense system
DHCPv6
dynamic deception
APT attack
dynamic policy allocation mechanism
dynamic timing selection method
hybrid encryption communication mechanism
SM4
Socket
sockets
Viterbi algorithm
Cryptography
Firewalls (computing)
APT
advanced persistent threat
Dynamic scheduling
Metrics
Scalability
Heuristic algorithms
computer network security
Resiliency
resilience
Human behavior
pubcrawl
IP networks
Servers
encryption
biblio
Algebraic Patterns of Vulnerabilities in Binary Code
Submitted by aekwall on Mon, 02/17/2020 - 1:42pm
sockets
symbolic modelling
rewriting rules
pattern creation
cyber reasoning systems
behaviour algebra
algebraic patterns
algebraic matching methods
algebraic matching
algebraic approach
algebra equations
Binary codes
binary code
Buffer overflows
Registers
Compositionality
Semantics
algebra
program diagnostics
pattern matching
vulnerability detection
Metrics
pubcrawl
Human behavior
Resiliency
1
2
next ›
last »