Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
coding theory
biblio
Finding Dependencies Between Cyber-Physical Domains for Security Testing of Industrial Control Systems
Submitted by aekwall on Wed, 02/13/2019 - 12:01pm
coding theory
security
Attack vectors
Cyber Dependencies
cyber-physical systems
Human behavior
ICS security
Information Flow
pubcrawl
Resiliency
Scalability
biblio
Assessing the Quality of Tabular State Machines through Metrics
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
quality of models
Variable speed drives
Unified modeling language
tabular state machines
software quality
software metrics
Software measurement
Software
security
Resiliency
resilience
Adaptation models
pubcrawl
Model metrics
Metrics
Cryptography
Compositionality
Complexity theory
coding theory
ASD models
analytical software design tooling
biblio
Correlation Analysis among Java Nano-Patterns and Software Vulnerabilities
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
pubcrawl
testing
static analysis
Software patterns
Software
security vulnerabilities
security
Resiliency
resilience
arrays
nano-patterns
Metrics
Measurement
Java
Cryptography
Compositionality
Complexity theory
coding theory
biblio
Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
security of data
Industrial Control Systems
Integrated circuit modeling
legacy systems
Metrics
process invariants
pubcrawl
resilience
Resiliency
security
industrial control
security requirements
security specifications
software maintenance
timed automata
UPPAAL
Valves
water supply
water treatment
computer security
and Cyber Physical Systems
Attack detection
attack detection mechanisms
automata
automata theory
Clocks
coding theory
Compositionality
6-stage operational water treatment plant
critical infrastructure
Cryptography
Cyber Attack Detection
cyber attack prevention
cyber security
formal methods
formal verification
ICs
biblio
Individually-Secure Multi-Source Multicast
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
network links
zero mutual information
telecommunication security
SMSM
security
secure MSM
Resiliency
resilience
Reliability
rate region
pubcrawl
nonsecure MSM
network topology
coding theory
network coding
Mutual information
multicast communication
Metrics
individually-secure multisource multicast
encoding
eavesdropper
cut-set bound
Cryptography
Compositionality
common secure model
biblio
Security for Minimum Storage Regenerating Codes and Locally Repairable Codes
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
MR codes
telecommunication security
security
secure storage codes
Secure storage
Resiliency
resilience
repair efficient distributed storage systems
pubcrawl
precoding
passive eavesdropper
outer coset code
MSR codes
Bandwidth
minimum storage regenerating codes
Metrics
maximally recoverable codes
maintenance engineering
LRC codes
locally repairable codes
inner storage code
Cryptography
Compositionality
coding theory
codes
biblio
Security in Heterogeneous Distributed Storage Systems: A Practically Achievable Information-Theoretic Approach
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
pubcrawl
malicious user security
Measurement
Metrics
perfect secrecy
Probabilistic logic
Probabilistic Model Checker
Probabilistic Model Checking
probability
information-theoretic security
Reliability
reliability assessment
resilience
Resiliency
security
Security Metrics
spread spectrum communication
attack algorithms
information theory
heterogeneous distributed storage system security
formal verification
erasure codes
encryption
distributed storage systems
distributed memory systems
Cryptography
cryptographic/information-theoretic approach
Computing Theory
Compositionality
coding theory
classical cryptographic approach
caching systems
cache storage
biblio
A Regression Model Based Approach for Identifying Security Requirements in Open Source Software Development
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
open source software development
up-front RE
textual information retrieval techniques
testing
software engineering
security requirements identification methods
security requirements identification
security of data
security
Resiliency
resilience
requirements engineering
regression model based approach
regression analysis
pubcrawl
OSS projects
coding theory
Open Source Software
Metrics
Measurement
Logistics
logistic regression
lightweight representation
just-in-time requirements engineering
information retrieval
Formal Specification
Cryptography
Compositionality
Complexity theory
comment writing
comment security aspect
biblio
Software Metrics as Indicators of Security Vulnerabilities
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
resilience
vulnerable software units
Software systems
software security vulnerabilities
software quality
software operational phase
software metrics
Software Architecture
software architectural characteristics
security vulnerabilities
security of data
security
search problems
Resiliency
coding theory
pubcrawl
nonvulnerable code
Metrics
heuristic search technique
function levels
file levels
Feature Selection
Cryptography
correlation coefficients
Correlation
Compositionality
Complexity theory
biblio
Secure Compilation and Hyperproperty Preservation
Submitted by grigby1 on Wed, 01/10/2018 - 12:19pm
Safety
untyped target language
typed source language
Type theory
trace-preserving compilation
TPC
Syntactics
standards
Semantics
Security Properties
security of data
security
secure compilers
secure compilation
safety hyperproperties
coding theory
Resiliency
pubcrawl
program verification
Program processors
program compilers
low-level attack capabilities
hyperproperty preservation
fully abstract compiler
correctness criterion
Concrete
composability
compiler security
compiled program
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »