Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public domain software
biblio
A Data Provenance Visualization Approach
Submitted by aekwall on Mon, 09/23/2019 - 10:41am
Data visualization
W3C-PROV-O specification compatible provenance data
social networking (online)
provenance visualization
PROV-O
Prototypes
open source visualization tool
data provenance visualization approach
data lineage
data provenance
Provenance
data visualisation
Big Data
public domain software
data analysis
metadata
tools
Metrics
component
composability
pubcrawl
Human behavior
Resiliency
Classification algorithms
biblio
Identification of Distributed Malware
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
public domain software
malware writers
Metrics
mobile computing
Mobile handsets
multiple anti-virus apps
open source platform
personal data
privacy
pubcrawl
malware prevention
Resiliency
security
Servers
simple worms
smart phones
smartphone revolution
sophisticated DDOS
static analysis
technological complexities increase
generic viruses
Android malware
Android system
attackers
botnets
computer malware
computer viruses
distributed direction
distributed malware
fully functional portable computers
android
Google
graph matching algorithm
graph theory
Human behavior
inholding multiple applications
Labeling
malware
Malware Analysis
malware detection
biblio
Prototyping Self-Managed Interdependent Networks - Self-Healing Synergies against Cascading Failures
Submitted by aekwall on Mon, 03/25/2019 - 9:54am
self-managed interdependent networks
power system faults
power system interconnection
Power system protection
power system reliability
pubcrawl
public domain software
real-world interdependent networks
resilience
self-healing
self-healing mechanism
self-healing networks
self-healing synergies
power grids
self-management
self-management software systems
SFINA
simulation
simulation framework for intelligent network adaptations
Smart Grid
socio-economic effects
Software
software artifact
techno-socio-economic sectors
Unified modeling language
interdisciplinary scope
cascading failure
catastrophic instabilities
complex networks
composability
Computational modeling
digital society
distributed system
failure analysis
general prototyping approach
healer network
interdependent networks
interdependent power networks
Adaptation models
Load flow
Load modeling
modeling
modular design solution
multiplex networks
network interconnection
open source software extension
organizational constraints
power cascading failures
power engineering computing
power flow exchanges
biblio
Spring Boot Based REST API to Improve Data Quality Report Generation for Big Scientific Data: ARM Data Center Example
Submitted by grigby1 on Fri, 03/22/2019 - 12:59pm
service-oriented architecture
production-grade Spring applications
pubcrawl
public domain software
resilience
Resiliency
rest
REST service API
Scalability
Servers
popular Spring Boot java-based framework
spring boot
spring boot application
spring configuration
spring model-view-controller framework
Springs
tools
user interfaces
web application technologies
data integrity
application server
arm data center example
atmospheric radiation measurement data center
auto configuration
Big Data
big data security
computer centres
CRUD
CRUD web applications
application program interfaces
data quality report generation
Databases
enterprise applications
internet
Java
java framework
Metrics
natural sciences computing
biblio
Software Ecosystem Call Graph for Dependency Management
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
popular form
ecosystem-level
Ecosystems
Equifax data breach
external libraries
fine-grained dependency network
impact
indicative information
leftpad package removal
open source software libraries
packages
developers
program analysis
public domain software
software development management
software ecosystem
software libraries
software reusability
Software reuse
workspace
Automated Secure Software Engineering
call graphs
security
Software
Resiliency
pubcrawl
composability
tools
Libraries
software engineering
automated tools
security of data
centralized code repositories
client-server systems
Computer bugs
core package
counter measure
dependencies
dependency checkers
Dependency management
dependency networks
biblio
Architecture of the Honeypot System for Studying Targeted Attacks
Submitted by grigby1 on Fri, 02/08/2019 - 4:38pm
Organizations
Task Analysis
targeted attacks
target attacks
Servers
security of data
Scalability
Resiliency
resilience
public domain software
pubcrawl
organized criminal groups
computer architecture
malware
Information systems
information security systems
information resources
Human Factors
Human behavior
honeypot system
honey pots
financial organizations
computer information
Computer crime
biblio
Block Level Streaming Based Alternative Approach for Serving a Large Number of Workstations Securely and Uniformly
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
scratchpad volatile memory
client workstation
client-server systems
Educational institutions
large number of clients
open source
Open Source solution
operating system
public domain software
client computer
security privacy constraints
University of Texas
user workstation security
virtualized computing
Windows clients
workstation configuration
Workstations
Windows Operating System Security
Servers
security
pubcrawl
Metrics
Resiliency
composability
Streaming media
Protocols
computer network security
data privacy
Linux
applications on-demand
Blades
block level streaming
campus computing
campus setting
Central Processing Unit
biblio
Performance Analysis of IDS with Honey Pot on New Media Broadcasting
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
security tools
network intrusion detection system
new media broadcasting
operating systems (computers)
pubcrawl
public domain software
resilience
Resiliency
Scalability
Linux open source operating system
Servers
Snort
TCP Flood
transport protocols
UDP flood
WiFi
Wireless fidelity
Human Factors
computer network security
denial of service
digital multimedia broadcasting
DoS
firewalls
Floods
Honey Pot
honey pots
Broadcasting
ICMP Flood
IDS
Intrusion Detection Systems
IPTV
IPTV system
LAN network
Linux
biblio
A Content Auditing Method of IPsec VPN
Submitted by grigby1 on Wed, 11/14/2018 - 1:13pm
man-in-the-middle mechanism
Windows
VPN technology
Virtual private networks
Servers
Resiliency
resilience
public domain software
pubcrawl
prototype system
Protocols
operating systems (computers)
operating systems
microsoft windows
Metrics
encryption audits
IPv4 network environment
IPsec VPN users
IPsec VPN
IP networks
internet
encryption
DPDK technology
DPDK
default configuration
content auditing method
Compositionality
authentication
auditing
audit system
biblio
Identifying and Documenting False Positive Patterns Generated by Static Code Analysis Tools
Submitted by grigby1 on Thu, 06/07/2018 - 3:12pm
public domain software
warning message
tools
system documentation
static code analysis tools
static code analysis
software tools
software engineering
security
Resiliency
resilience
commercial tool
pubcrawl
program diagnostics
open-source tools
Open Source Software
Human behavior
false positive pattern identification
false positive pattern documentation
Context
Conferences
composability
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »