Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Manuals
biblio
Unmasking Windows Advanced Persistent Threat Execution
Submitted by grigby1 on Wed, 05/05/2021 - 12:58pm
dataset
statistical analysis
security
Scalability
sandboxing
pubcrawl
policy-based governance
Manuals
Industries
feature extraction
advanced persistent threat
data privacy
cyber security
Conferences
composability
collaboration agreements
collaboration
APT Execution
APT
biblio
Optimizing Away JavaScript Obfuscation
Submitted by grigby1 on Wed, 05/05/2021 - 12:43pm
Open Source Software
tools
static analysis
Safe Coding
Resiliency
resilience
pubcrawl
policy-based governance
Payloads
collaboration
obfuscation
Metrics
Manuals
malware
JavaScript
internet
Human Factors
Human behavior
biblio
Continuous Compliance
Submitted by aekwall on Mon, 03/22/2021 - 1:08pm
continuous compliance process
Open Source Software
Manuals
key length
SoC
PCI DSS
auditing source code
cloud data stores
compliance certificate
encryption audits
cryptographically unsafe algorithms
FedRAMP
Hard-coded credentials
large cloud-services company
lightweight verification tools
open-source software
pluggable type systems
source-code compliance requirement
Production
Cryptography
Data Security
data privacy
Resiliency
pubcrawl
Compliance
standards
tools
Cloud Computing
Industries
software engineering
public domain software
encryption
program diagnostics
program verification
Predictive Metrics
Compositionality
biblio
Data-driven fault model development for superconducting logic
Submitted by grigby1 on Tue, 03/16/2021 - 2:10pm
Analytical models
Circuit faults
clean slate
collaboration
fault diagnosis
Human behavior
Integrated circuit modeling
Manuals
Metrics
policy-based approach
pubcrawl
resilience
Resiliency
Semiconductor device modeling
simulation
biblio
Gap between Theory and Practice: An Empirical Study of Security Patches in Solidity
Submitted by aekwall on Mon, 03/15/2021 - 12:07pm
contracts
vulnerability patches
Solidity team
Solidity
security patches
real-world Solidity contracts
real-world Ethereum smart contracts
potentially vulnerable contracts
missing security patches
Ethereum smart contract developers
empirical study
smart contract security
Manuals
electronic commerce
compiler security
C++ language
security of data
program compilers
Compositionality
encoding
program diagnostics
smart contracts
security vulnerabilities
static analysis
software engineering
tools
Metrics
pubcrawl
Resiliency
security
telecommunication security
Scalability
biblio
Biometric Authentication for Safety Lockers Using Cardiac Vectors
Submitted by grigby1 on Tue, 03/09/2021 - 3:03pm
Human behavior
security
Scalability
Safety
Resiliency
resilience
pubcrawl
Metrics
Manuals
Identification
authentication
feature extraction
Electrocardiography
ECG
Digital Lockers
control systems
BIOS
biometrics (access control)
Bio-metrics
biblio
Automating the BGE Attack on White-Box Implementations of AES with External Encodings
Submitted by grigby1 on Thu, 03/04/2021 - 2:34pm
reverse engineering
white-box cryptography
White Box Security
white box cryptography
white box
test equipment
standards
Software systems
security
secure software
Automated Secure Software Engineering
Resiliency
resilience
pubcrawl
Metrics
Manuals
encoding
Consumer electronics
composability
biblio
An Analysis of Effectiveness of Black-Box Web Application Scanners in Detection of Stored SQL Injection and Stored XSS Vulnerabilities
Submitted by grigby1 on Wed, 02/10/2021 - 1:22pm
Black-box scanners
Cross Site Scripting
cross-site scripting
Databases
Human behavior
Manuals
Payloads
pubcrawl
resilience
Resiliency
Scalability
SQL injection
stored SQLI
Stored XSS
Uniform resource locators
Web pages
biblio
User Credibility Assessment Based on Trust Propagation in Microblog
Submitted by grigby1 on Wed, 12/02/2020 - 2:15pm
online social network
user social relationship graph
user credibility assessment
Uniform resource locators
two-way propagation trust scoring
trustworthiness-based user credibility evaluation algorithm
Trusted Computing
trust propagation
trust
social networking (online)
Social network services
seed node selection algorithm
pubcrawl
pruning algorithm
optimisation
online social networking platform
Clustering algorithms
network topology
microblog user credibility evaluation algorithm
Microblog platform
microblog
Manuals
malicious users
low trusted user
Human Factors
Human behavior
graph theory
feature extraction
Fans
false social relationships
Computing Theory
biblio
Trust of Humans in Supervisory Control of Swarm Robots with Varied Levels of Autonomy
Submitted by grigby1 on Tue, 12/01/2020 - 1:35pm
pubcrawl
trust-related human factors
Task Analysis
target foraging task
Switches
swarm supervisory control
swarm robots
swarm robotics
supervisory control
search problems
search algorithm
robust trust
robots
Resiliency
resilience
Robot Trust
passively monitoring operators
multi-robot systems
mobile robots
mixed-initiative LOA
Manuals
manual LOA
levels of autonomy
human-robot interaction
human operator
Human Factors
Human behavior
fully autonomous LOA
flocking swarm
automation
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »