Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security vulnerabilities
biblio
A Meta-Analysis of Efficient Countermeasures for Data Security
Submitted by grigby1 on Fri, 07/14/2023 - 10:48am
Training data
encryption audits
sensitive data
security risks
data attacks
threats
Resiliency
Data protection
renewable energy sources
feature extraction
Compositionality
Data Security
security vulnerabilities
Companies
resilience
Metrics
pubcrawl
machine learning algorithms
biblio
OWASP Attack Prevention
Submitted by grigby1 on Fri, 02/03/2023 - 3:51pm
Knowledge engineering
Web Application Firewall
open systems
SQL injection detection
Communication Systems
cross-site scripting
OWASP
security vulnerabilities
Web servers
pubcrawl
SQL injection
Firewalls (computing)
privacy
Resiliency
resilience
policy-based governance
Metrics
Human behavior
biblio
Predicting Security Vulnerabilities using Source Code Metrics
Submitted by aekwall on Fri, 07/29/2022 - 4:27pm
Prediction algorithms
object oriented security
source code
security vulnerabilities
software metrics
Object oriented modeling
codes
prediction
supervised learning
security
composability
Resiliency
Metrics
pubcrawl
machine learning algorithms
machine learning
Measurement
biblio
Enhancement in Buffer Overflow (BOF) Detection Capability of Cppcheck Static Analysis Tool
Submitted by grigby1 on Thu, 07/28/2022 - 2:06pm
static code analysis
buffer overflow
Buffer overflows
codes
composability
cyber warfare
Data flow analysis using DFG
Human behavior
Performance analysis
pubcrawl
resilience
Resiliency
security
security vulnerabilities
static analysis
Static Analysis Security Tool
biblio
Improved Secure Internet of Things System using Web Services and Low Power Single-board Computers
Submitted by grigby1 on Mon, 03/29/2021 - 1:16pm
Internet of Things system
Web-based communication
web services
single-board computers
single board computers
service-oriented architecture
sensors
security vulnerabilities
security
Scalability
pubcrawl
privacy
microcomputers
message authentication
IoT system
IoT architecture
authentication
Internet of Things security
Internet of Things
Human Factors
expert systems
data privacy
data integrity
data confidentiality
data availability
cyber security
Cryptography
Computers
computer architecture
authorization
authorisation
biblio
Dynamic Information Flow Tracking for Embedded Binaries using SystemC-based Virtual Prototypes
Submitted by grigby1 on Mon, 03/29/2021 - 12:03pm
Metrics
virtual prototyping
vehicle dynamics
SystemC-based virtual prototypes
security vulnerabilities
security related exploits
security policies
security of data
security
Resiliency
resilience
pubcrawl
Prototypes
accurate DIFT
existing DIFT approaches
Engines
embedded systems
embedded binaries
early DIFT
Dynamic Information Flow Tracking
DIFT engine
Data models
data flow analysis
composability
C++ languages
biblio
Towards Security Attack and Risk Assessment during Early System Design
Submitted by grigby1 on Mon, 03/29/2021 - 12:02pm
pubcrawl
task mappings
system designers
smart devices
security vulnerabilities
security risk
security constraints
security attackers
security attack
Secure IoT Systems
Secure Embedded Consumer Devices
risk assessment
Resiliency
resilience
composability
Metrics
IoT devices
Internet of Things
embedded systems
Embedded System Design
design space exploration tools
Design Space Exploration
cybersecurity attacks
cyber-physical systems
cyber security
CPS
computer network security
biblio
Extracting Taint Specifications for JavaScript Libraries
Submitted by grigby1 on Mon, 03/15/2021 - 1:10pm
static analysis tools
pubcrawl
resilience
Resiliency
security
security of data
security vulnerabilities
software engineering
static analysis
program testing
taint sinks
taint specifications
test suites
testing
third-party libraries
tools
Writing
JavaScript applications
access path mechanism
authoring languages
command injection attacks
composability
cross-site scripting
dynamic analysis
Entry points
exit points
taint analysis
JavaScript libraries
Libraries
Metrics
Node.js platform
npm repository
package dependency structure
program diagnostics
biblio
Gap between Theory and Practice: An Empirical Study of Security Patches in Solidity
Submitted by aekwall on Mon, 03/15/2021 - 12:07pm
contracts
vulnerability patches
Solidity team
Solidity
security patches
real-world Solidity contracts
real-world Ethereum smart contracts
potentially vulnerable contracts
missing security patches
Ethereum smart contract developers
empirical study
smart contract security
Manuals
electronic commerce
compiler security
C++ language
security of data
program compilers
Compositionality
encoding
program diagnostics
smart contracts
security vulnerabilities
static analysis
software engineering
tools
Metrics
pubcrawl
Resiliency
security
telecommunication security
Scalability
biblio
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network
Submitted by grigby1 on Tue, 03/09/2021 - 2:48pm
LN community
wormhole attack
sensitive payment information
security vulnerabilities
security
Scalability
Receivers
quantitative analysis
pubcrawl
privacy
permissionless decentralized cryptocurrencies
payment channel networks
network-wide DoS attack costs
multihop payment protocols
anonymity
Lightning Network
Lightning
Human behavior
denial-of-service attacks
data privacy
Cryptographic Protocols
cryptocurrencies
contracts
concurrent payments
computer network security
channel capacity
bitcoin
anonymity issues
1
2
3
4
5
6
7
next ›
last »