Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public domain software
biblio
uPort Open-Source Identity Management System: An Assessment of Self-Sovereign Identity and User-Centric Data Platform Built on Blockchain
Submitted by grigby1 on Mon, 03/29/2021 - 1:22pm
SSI
pubcrawl
public domain software
resilience
Resiliency
Scalability
Self-Sovereign Identity
Servers
smart contracts
Open Source Software
SSI IDM system
standards
uPort
uPort identity management system
uPort open-source identity management system
user-centric data platform
Verifiable Credential
blockchain
Mobile Applications
IdM
identity management systems
identity management system
Identity management
Human behavior
ethereum
Distributed databases
digital services
DID
Decentralized IDentifier
decentralized application
Decentralized App
DApp
Cryptography
biblio
Continuous Compliance
Submitted by aekwall on Mon, 03/22/2021 - 12:08pm
continuous compliance process
Open Source Software
Manuals
key length
SoC
PCI DSS
auditing source code
cloud data stores
compliance certificate
encryption audits
cryptographically unsafe algorithms
FedRAMP
Hard-coded credentials
large cloud-services company
lightweight verification tools
open-source software
pluggable type systems
source-code compliance requirement
Production
Cryptography
Data Security
data privacy
Resiliency
pubcrawl
Compliance
standards
tools
Cloud Computing
Industries
software engineering
public domain software
encryption
program diagnostics
program verification
Predictive Metrics
Compositionality
biblio
ComPy-Learn: A toolbox for exploring machine learning representations for compilers
Submitted by aekwall on Mon, 03/15/2021 - 11:07am
compilers
program compilers
Clang
LLVM
compiler security
empirical evaluation
Clang compiler
Code Representations
compiler heuristics
Compositionality
ComPy-Learn
developer productivity
graph representations
LLVM compiler backend
program code
software engineering tools
software performance
syntax-level language information
tools
Task Analysis
Program processors
learning (artificial intelligence)
Resiliency
pubcrawl
machine learning
Metrics
optimization
Scalability
Training
software engineering
public domain software
Vulnerability prediction
program diagnostics
Predictive models
Pipelines
biblio
Successes and Failures in Exploring Biometric Algorithms in NIST Open Source Software and Data
Submitted by grigby1 on Tue, 03/09/2021 - 2:04pm
resilience
multifactor
multimodal
NIST
NIST open source software
open-source software
password-driven methods
pubcrawl
public domain software
recognition
Metrics
Resiliency
Scalability
secure approaches
security
Software
test data
Unibiometric analysis
user authentication methods
cryptosystem
authorisation
Bio-metric
biometric algorithms
biometric authentication method
biometric data
biometrics (access control)
BIOS
Cryptography
authentication
fingerprint
Fingerprint recognition
fuzzy vault
Human behavior
Identification
internal open source utilities
Iris
Iris recognition
biblio
Attacks on Dynamic Protocol Detection of Open Source Network Security Monitoring Tools
Submitted by grigby1 on Tue, 02/16/2021 - 11:46am
transport protocols
dynamic networks
widespread open-source network monitoring tools
source network monitoring tools
real-world monitoring operations
protocol-specific deep packet inspection
protocol disambiguation
Protocol detection
monitoring systems
HTTP
Dynamic Protocol Detection mechanisms
Inspection
application layer protocol
Web servers
security of data
public domain software
network security
composability
Communication networks
Protocols
Conferences
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
Monitoring
biblio
A Practical Exercise System Using Virtual Machines for Learning Cross-Site Scripting Countermeasures
Submitted by grigby1 on Wed, 02/10/2021 - 12:19pm
Resiliency
XSS countermeasures
XSS attacks
Web servers
Web server
Web pages
Web Browser Security
Web browser
web applications
Virtual machining
virtual machines
tools
Software
security of data
Scalability
virtual machine security
resilience
public domain software
pubcrawl
practical exercise system
online front-ends
learning cross-site scripting
internet
Human behavior
cross-site scripting
Cross Site Scripting
computer science education
Browsers
security
virtual machine
biblio
Determining the Hazard Quotient of Destructive Actions of Automated Process Control Systems Information Security Violator
Submitted by grigby1 on Wed, 02/03/2021 - 11:54am
automation
process criticality category
open sources
multilevel distributed automated process control systems
MATLAB
information security violator
industrial facilities
Hazards
hazard quotient
destructive actions
destructive action
information security system
control system security
security of data
automated process control systems
public domain software
information security
production engineering computing
Industrial Control Systems
process control
control engineering computing
Scalability
Software
Resiliency
resilience
pubcrawl
biblio
JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets
Submitted by grigby1 on Wed, 01/20/2021 - 3:21pm
proprietary manufacturer-specific APIs
low-level cryptographic primitives
memory footprint
nondisclosure agreements
open code sharing
open library
open systems
open-source development
open-source licenses
optimisation
optimization
proprietary APIs
low-level cryptographic operations
pubcrawl
public domain software
resilience
Resiliency
resource-constrained platforms
smart cards
smartcards
software libraries
standards
transparency
wrapper cryptographic library
Elliptic curves
APIs
application program interfaces
application programming interface
auditability
Big Integers
certification
certification transparency
Compositionality
Cryptography
data types
elliptic curve operations
API
generic library
Hardware
interoperability
Java
JavaCard
JavaCard API
JavaCard applets
JavaCard multiapplication platform
JCMathLib
Libraries
biblio
Web APIs in Android through the Lens of Security
Submitted by grigby1 on Wed, 01/20/2021 - 3:19pm
network communication
web communication
Web APIs
Web API URLs
telecommunication security
security of data
security
Resiliency
resilience
public domain software
pubcrawl
open-source apps
network libraries
Android apps
mobile computing
Mobile Apps
JSON data schemas
internet
Compositionality
communication libraries
communication
application programming interface
application program interfaces
APIs
API service providers
API
biblio
Vulnerability assessment and detection of Deepfake videos
Submitted by grigby1 on Fri, 01/15/2021 - 11:12am
vulnerability assessment
VidTIMIT database
VGG
pre-trained generative adversarial network
Open Source Software
Facenet neural networks
face recognition systems
deepfake video detection
DeepFake
video signal processing
gan
vulnerability detection
learning (artificial intelligence)
face recognition
Metrics
public domain software
neural nets
Scalability
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
1
2
3
4
5
6
7
next ›
last »