Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security vulnerabilities
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 2:55pm
security of data
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
Network reconnaissance
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
data privacy
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
adversarial reconnaissance
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
biblio
Cookies in a Cross-site scripting: Type, Utilization, Detection, Protection and Remediation
Submitted by grigby1 on Wed, 02/10/2021 - 1:20pm
Browsers
Cross Site Scripting
XSS
spyware
protection
mitigation
cookies
Cisco 2018
artificial intelligence techniques
cross-site scripting
classification
web applications
Cryptography
Artificial Intelligence
security vulnerabilities
Data protection
internet
Scalability
Resiliency
resilience
Human behavior
pubcrawl
security of data
encryption
biblio
ROSploit: Cybersecurity Tool for ROS
Submitted by grigby1 on Thu, 12/17/2020 - 1:37pm
ROS
resilience
Resiliency
robot operating systems
robot programming
robotic operating system security research
robotic systems
robotics
robots
Reconnaissance
ROS systems
ROSploit
security
security of data
security vulnerabilities
threat model
tools
Analytical models
public domain software
pubcrawl
preliminary state
policy-based governance
operating systems (computers)
operating systems
offensive tool
modular two-pronged offensive tool
Human Factors
Human behavior
foundational knowledge
cybersecurity tool
Cybersecurity
control engineering computing
Biological system modeling
biblio
Trustworthiness Assessment of Web Applications: Approach and Experimental Study using Input Validation Coding Practices
Submitted by aekwall on Mon, 12/07/2020 - 12:30pm
secure code
web applications
Web application
vulnerabilities
trustworthiness assessment
trustworthiness
software security
software quality
security vulnerabilities
security perspective
security of data
Assessment
quality model
pubcrawl
internet
input validation practices
input validation coding practices
feasible security practices results
composability
coding practices
assessment techniques
biblio
Crypto trust point (cTp) for secure data sharing among intelligent vehicles
Submitted by aekwall on Mon, 11/23/2020 - 11:22am
IVs communication environment
crypto trust point
CTP
illegitimate vehicles behavior
information communication
Intelligent vehicle technology
Intelligent vehicles
intelligent vehicles communication
IV communication
IV data security
communication channel
legitimate vehicles behavior
rewarding thereby building trust
successful communication
Traditional Security approaches
Trust point mechanism
Vehicle communication
Intelligent Data Security
Intelligent Data and Security
trust
Scalability
Cryptography
telecommunication security
security
Resiliency
pubcrawl
vehicular ad hoc networks
blockchain
traffic engineering computing
Distributed databases
Reliability
security vulnerabilities
Compositionality
data accuracy
secure data
Insurance
communication data
biblio
Security Requirements for Cloud-based C4I Security Architecture
Submitted by grigby1 on Fri, 11/20/2020 - 2:25pm
national innovation
US military
Task Analysis
Servers
security vulnerabilities
security requirements
Security Policies Analysis
security of data
secure security architecture
public sector
pubcrawl
policy-based governance
Cloud Computing
national defense command control system
military computing
Korea national defense information system
Korea Military
Information systems
computer security
command and control systems
Cloud-based C4I Security Requirements
cloud-based C4I security architecture
cloud computing technology
cloud computing system
biblio
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development
Submitted by grigby1 on Tue, 11/17/2020 - 2:41pm
OWASP
access sensitive information
Android development
data leaks
defensive requirements analysis
development lifecycle
development stage
guided security requirement analysis
Mobile Apps
mobile apps flaws
mobile software engineers
necessary security knowledge
information confidentiality
OWASP mobile top ten risks
OWASP risk analysis driven security requirements specification
secure Android mobile software development
secure mobile SDLC
secure mobile software development education
security defects open doors
security requirements
software developers
useful mobile security guidelines
Operating systems security
software engineering
security
pubcrawl
Metrics
Resiliency
data integrity
security threats
composability
mobile computing
smart phones
malware
software development management
security of data
security vulnerabilities
SDLC
risk analysis
resilience
testing
Detectors
Mobile Applications
Banking
Android (operating system)
security holes
biblio
Security Vulnerabilities in Handover Authentication Mechanism of 5G Network
Submitted by aekwall on Mon, 11/16/2020 - 2:50pm
Resilient Security Architectures
IoT-based applications
key hierarchy
key resilience problem
message authentication
mobility management (mobile radio)
pre-authentication
pubcrawl
Resiliency
Internet of Things
secret keys
security counter-measures
security demands
security issues
security vulnerabilities
Security weakness
telecommunication security
Third Generation Partnership Project
communication entities
5G communication network
5G handover
5G handover key mechanism
5G handover security analysis
5G mobile communication
5g network
authentication
authentication complexity
3GPP
computer architecture
Fifth Generation mobile telecommunication technology
Handover
handover architecture
handover key mechanism
handover mechanism
inter-gNB handover
inter-gNB handover authentication mechanism
biblio
Compliance Checking of Open Source EHR Applications for HIPAA and ONC Security and Privacy Requirements
Submitted by aekwall on Mon, 11/09/2020 - 1:20pm
OpenEMR
digital versions
EHR applications
Electronic Health Record applications
Health Information Technology certification criteria
Health Insurance Portability
HIPAA Compliance
HIPAA technical requirements
ONC certification
ONC criteria
open source EHR applications
convenient access
paper-based patient
patient medication
patient treatment plans
precise medical decision-making process
privacy criteria
Privacy Requirements
regulatory requirements
security risks
static code analysis-based vulnerability
Information Reuse and Security
static analysis
Servers
data privacy
electronic health records
Medical services
security
Resiliency
pubcrawl
privacy
tools
open source tools
security of data
security vulnerabilities
health care
security issues
Compositionality
certification
adopted EHR application
certification compliance
clinic visits
compliance checking
biblio
Using Software Metrics for Predicting Vulnerable Code-Components: A Study on Java and Python Open Source Projects
Submitted by aekwall on Mon, 11/02/2020 - 2:46pm
Python vulnerable function prediction
vulnerability predictors
vulnerability prediction performance
Vulnerability prediction
testing
software security
software reliability
software projects
software metrics-based vulnerability prediction
software metrics
security vulnerabilities
security of data
security
safety-critical software
code component
Python open source projects
Python
public domain software
pubcrawl
Metrics
metrics testing
Measurement
machine learning
learning (artificial intelligence)
Java vulnerable functions
Java projects
Java
code-component
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »