Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public domain software
biblio
Power Efficient Smart Home with Voice Assistant
Submitted by grigby1 on Thu, 12/17/2020 - 2:02pm
resilience
mobile robots
NodeMCU
policy-based governance
power efficient smart home
pubcrawl
public domain software
Raspberry Pi
real-time systems
mobile computing
Resiliency
robot operating systems
security
Smart Home
Smart homes
temperature sensor
Temperature sensors
voice assistant
Firebase realtime database
Android application
Arduino IDE
database management systems
domestic appliances
electrical appliances
Electrical products
Fans
fire alarm
Adafruit IO
flame sensor
Gas detectors
Google firebase application
Home appliances
home automation
Human behavior
Human Factors
IFTTT
biblio
ROSploit: Cybersecurity Tool for ROS
Submitted by grigby1 on Thu, 12/17/2020 - 1:37pm
ROS
resilience
Resiliency
robot operating systems
robot programming
robotic operating system security research
robotic systems
robotics
robots
Reconnaissance
ROS systems
ROSploit
security
security of data
security vulnerabilities
threat model
tools
Analytical models
public domain software
pubcrawl
preliminary state
policy-based governance
operating systems (computers)
operating systems
offensive tool
modular two-pronged offensive tool
Human Factors
Human behavior
foundational knowledge
cybersecurity tool
Cybersecurity
control engineering computing
Biological system modeling
biblio
An Overview of Robot Operating System Forensics
Submitted by grigby1 on Thu, 12/17/2020 - 1:35pm
operating systems
robot operating systems
ROS security
robot operating system forensics
open source operational environment
digital investigation studies
client-server connection
autonomous technologies
Robot Operating System
Service robots
robot programming
vulnerabilities
Industry 4.0
Robot sensing systems
Forensics
privacy
operating systems (computers)
public domain software
Cyber-security
Industries
data privacy
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
Digital Forensics
security
biblio
Using Software Metrics for Predicting Vulnerable Code-Components: A Study on Java and Python Open Source Projects
Submitted by aekwall on Mon, 11/02/2020 - 2:46pm
Python vulnerable function prediction
vulnerability predictors
vulnerability prediction performance
Vulnerability prediction
testing
software security
software reliability
software projects
software metrics-based vulnerability prediction
software metrics
security vulnerabilities
security of data
security
safety-critical software
code component
Python open source projects
Python
public domain software
pubcrawl
Metrics
metrics testing
Measurement
machine learning
learning (artificial intelligence)
Java vulnerable functions
Java projects
Java
code-component
biblio
Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries
Submitted by aekwall on Mon, 10/26/2020 - 11:46am
firmware binaries
critical cyber-physical IoT devices hinges
Cyber Physical System
cyber-physical execution semantic information
cyber-physical execution semantics
cyber-physical IoT control application domains
cyber-physical security flaws
domain-specific reverse engineering framework
domain-specific semantic information
dynamic selective memory protection
embedded binary code
embedded controller software binaries
embedded IoT controller software binaries
executables
Execution Semantic
control algorithm parameters
firmware vulnerability assessment
high-level algorithmic expressions
Linux kernel controllers versions
low-level binary symbolic values
memory forensics analysis
MISMO
reverse engineering outcomes
robotics
semantic-matching
state estimation algorithms
Symbolic Comparison
Symbolic Expression
targeted memory data attacks
Linux Operating System Security
Security analysis
security of data
Internet of Things
security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
Metrics
Data mining
public domain software
firmware
IoT
reverse engineering
Heuristic algorithms
program verification
control engineering computing
Semantics
Software algorithms
Predictive Metrics
Binary codes
operating system kernels
algorithmic level
algorithm-level semantics
binary patching
control algorithm
biblio
Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux System
Submitted by aekwall on Mon, 10/26/2020 - 11:45am
Drone
Weapons
software vulnerabilities
Linux operating system
2.0
AR
AR Drone 2.0
Busybox
CVE
autonomous aerial vehicles
embedded
embedded Linux system
open WiFi network
pairing mode
Parrot
SSH Tunnel
Linux Operating System Security
Metrics
computer network security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
security
tools
vulnerabilities
Vulnerability Analysis
public domain software
wireless LAN
Streaming media
Predictive Metrics
biblio
Adaptive Random Testing for XSS Vulnerability
Submitted by aekwall on Mon, 09/28/2020 - 12:34pm
Browsers
Cross Site Scripting
XSS testing tool
Subspace constraints
open source vulnerable benchmarks
headless browser
fuzzing method
common vulnerabilities
black-box testing tools
ART method
adaptive random testing
XSS vulnerability
fuzzing
security of data
Payloads
web applications
public domain software
program testing
cross-site scripting
Web sites
tools
internet
pubcrawl
Human behavior
Resiliency
Scalability
biblio
SWAN\_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods
Submitted by aekwall on Mon, 09/28/2020 - 11:33am
novel automated machine-learning approach SWAN
software metrics
graphical user interfaces
machine-learning
active machine learning
authentication methods
bug detection
code-specific methods
IntelliJ plugin
program debugging
program analysis
security-relevant methods
semiautomated detection
SRM
static analysis tools
SWAN\_ASSIST aids developers
SWAN\_ASSIST tool
time exactly those methods whose classification best impact
machine learning
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
vulnerability detection
Training
Libraries
security
authentication
public domain software
software maintenance
Automated Secure Software Engineering
Java
program diagnostics
software quality
biblio
File I/O Performance Analysis of ZFS BTRFS over iSCSI on a Storage Pool of Flash Drives
Submitted by grigby1 on Fri, 09/04/2020 - 3:15pm
Linux
BTRFS
compute-intensive systems
file I/O performance
file system
filesystem
flash drives
highly functioning storage systems
iSCSI
block device
NAS storage
open-source filesystem ZFS
storage hardware
storage pool
subvolume
ZFS
BIOS Security
Metrics
Cloud Computing
Scalability
Conferences
Bandwidth
tools
Hardware
storage management
pubcrawl
security
Resiliency
resilience
public domain software
Human Factors
performance evaluation
data management
backup storage
biblio
An Open Source Approach to Automating Surveillance and Compliance of Automatic Test Systems
Submitted by aekwall on Mon, 08/24/2020 - 12:42pm
automatic test systems
Security Technical Implementation Guidelines
Quasar
Pulsar
OpenScap
open source strategy
open source Elastic Stack
open source data processing pipeline
open source approach
Nebula
HubbleStack components
HubbleStack
hardware abstraction layer software
fast file integrity manger
centralized infrastructure
automating surveillance
security of data
automatic test software
cyber
operating systems (computers)
ATE
application program interfaces
Automated Response Actions
public domain software
open source
internet
composability
pubcrawl
Resiliency
operating system
system monitoring
data integrity
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »