Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Writing
biblio
If It’s Not Secure, It Should Not Compile: Preventing DOM-Based XSS in Large-Scale Web Development with API Hardening
Submitted by aekwall on Tue, 04/19/2022 - 11:28am
Cross Site Scripting
cross-site scripting
Empirical Software Engineering
encoding
Human behavior
language based security
pubcrawl
Resiliency
Scalability
security
Software
software engineering
testing
web security
Writing
biblio
Towards Reliable Spatial Memory Safety for Embedded Software by Combining Checked C with Concolic Testing
Submitted by grigby1 on Mon, 03/14/2022 - 12:22pm
operating systems
Virtual Prototype
RIOT
memory safety
embedded software
concolic testing
Checked C
codes
RISC-V
Writing
software reliability
pubcrawl
Metrics
Policy Based Governance
Safe Coding
Computer bugs
Runtime
Safety
Resiliency
resilience
Human Factors
Human behavior
biblio
Investigating the Changes in Software Metrics after Vulnerability Is Fixed
Submitted by grigby1 on Thu, 02/24/2022 - 2:49pm
big data security metrics
codes
Measurement
Metrics
Predictive models
predictive security metrics
pubcrawl
Security Metrics
software metric
software metrics
software security
static analysis
Text Mining
Vulnerability
Writing
biblio
A Lightweight Integrity Authentication Approach for RFID-enabled Supply Chains
Submitted by grigby1 on Fri, 02/04/2022 - 2:51pm
radio frequency identification
RFIDs
Tag Detection
Authentication Chain
human behaviors
Writing
supply chains
RFID
Sociology
pubcrawl
Probabilistic logic
Prototypes
authentication
performance evaluation
Resiliency
resilience
Human behavior
biblio
Programmable Data Planes as the Next Frontier for Networked Robotics Security: A ROS Use Case
Submitted by grigby1 on Thu, 02/03/2022 - 4:08pm
Protocols
robot operating systems security
in-network computing
P4
Human Factors
ROS
Writing
operating systems
malware
collaboration
robots
Resiliency
resilience
policy-based governance
pubcrawl
security
Computer hacking
biblio
Voice Prescription with End-to-End Security Enhancements
Submitted by grigby1 on Mon, 01/10/2022 - 12:17pm
natural language processing
Writing
wireless LAN
Technological innovation
Speech recognition
SMS4-BSK
Scalability
Resiliency
resilience
real-time systems
pubcrawl
iOS Security
Mobile Application
Metrics
ios
hypertext transfer protocol
Human behavior
Healthcare
drugs
Application program interface
android encryption
android
biblio
If It's Not Secure, It Should Not Compile: Preventing DOM-Based XSS in Large-Scale Web Development with API Hardening
Submitted by grigby1 on Mon, 12/20/2021 - 11:28am
language based security
Writing
web security
testing
software engineering
Software
security
Resiliency
resilience
pubcrawl
API
encoding
Empirical Software Engineering
cross-site scripting
Compositionality
composability
Application Programming Interface (API)
application program interfaces
Application program interface
APIs
biblio
Individual versus Computer-Supported Collaborative Self-Explanations: How Do Their Writing Analytics Differ?
Submitted by grigby1 on Mon, 11/29/2021 - 3:34pm
pubcrawl
writing analytics
Writing
text analytics
Task Analysis
Syntactics
Self-explanations
Scalability
reflection
Coherence
Metrics
Human Factors
Human behavior
computer-supported collaborative learning
composability
Collaborative Work
collaboration
Coh-Metrix
biblio
PPGPass: Nonintrusive and Secure Mobile Two-Factor Authentication via Wearables
Submitted by grigby1 on Thu, 07/08/2021 - 3:38pm
authentication
biometrics
biometrics (access control)
feature extraction
Heart beat
Human behavior
Human Factors
Mobile/wearable computing
pubcrawl
two factor authentication
two-factor authentication
Wearable sensors
Writing
biblio
Virtual Machine Monitor-based Hiding Method for Access to Debug Registers
Submitted by grigby1 on Thu, 07/08/2021 - 2:27pm
Virtual machining
virtual machine security
virtual machine monitor
debug register
virtual machine
Cyber Physical System
Writing
system security
operating systems
Virtual machine monitors
Cryptography
Registers
composability
Hardware
Resiliency
resilience
pubcrawl
Monitoring
security
« first
‹ previous
1
2
3
4
5
6
next ›
last »