Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security vulnerabilities
biblio
CAN Radar: Sensing Physical Devices in CAN Networks based on Time Domain Reflectometry
Submitted by aekwall on Mon, 07/20/2020 - 10:43am
radar detection
Resistance
controller area networks
automotive networks
broadcast medium
CAN radar networks
Distance measurement
Impedance measurement
malicious message transmission
Transmission line measurements
radar receivers
Resistors
sensing unit
TDR technique
time domain reflectometry technique
time-domain reflectometry
transceivers
vehicle network
sensors
IDS
Internet of Things
cyber-physical systems
Resiliency
pubcrawl
Anomaly Detection
security vulnerabilities
security mechanisms
Intrusion Detection
Intrusion Detection Systems
protocol
automotive security
controller area network
controller area network security
Impedance
power transmission lines
biblio
Study of hardware trojans based security vulnerabilities in cyber physical systems
Submitted by grigby1 on Thu, 07/16/2020 - 11:57am
SCADA systems
IC industry
integrated circuits
invasive software
malicious modifications
Metrics
pubcrawl
reliable functionality
resilience
Resiliency
hardware-in-the-loop based simulation platform
secure functionality
security
Security Awareness
security vulnerabilities
simulations
software peripherals
threat models
Trojan horses
CPS modeling
closed-loop systems
completely virtual simulation platform
complex computing environment
composability
Computational modeling
computing chip
computing hardware design
computing platform
closed loop systems
critical CPS application
cyber physical systems
cyber-physical systems
gas pipeline based SCADA system
Hardware
hardware internals
Hardware Trojans
hardware-in-the loop simulation
biblio
A Multi-factor Biometric Authentication Scheme Using Attack Recognition and Key Generator Technique for Security Vulnerabilities to Withstand Attacks
Submitted by aekwall on Mon, 06/01/2020 - 11:04am
key generator technique
World Wide Web
withstand external attacks
security vulnerabilities
security
Resiliency
resilience
pubcrawl
password
multifactor biometric authentication scheme
multifactor authentication
Multi-factor authentication
Metrics
attack recognition
internet
information sharing
Human Factors
Human behavior
Fingerprint recognition
Databases
Data Security
data privacy
Communication networks
biometrics (access control)
biometric
authorisation
biblio
A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks
Submitted by aekwall on Tue, 05/26/2020 - 11:03am
Metrics
unmanned aerial unit
uav
telecommunication security
security vulnerabilities
security
Routing protocols
Routing Protocol
Routing
Resiliency
pubcrawl
NS3 simulator
network security
mobile adhoc networks
mobile ad hoc networks
ad hoc on-demand distance vector routing
MANET security
MANET routing protocol
MANET AODV protocol
MANET
Loss measurement
IoT
Internet of Things
disaster recovery
delays
Compositionality
automata
AODV protocol
AODV based adhoc networks
biblio
Using Safety Properties to Generate Vulnerability Patches
Submitted by aekwall on Mon, 04/20/2020 - 10:45am
relational databases
vulnerability-specific safety properties
source code patches
Software-Vulnerability
Software-Patch
safety-property
safety property
property-based APR
Program-Analysis
Buffer storage
automatic program repair methods
Automated-Program-Repair
relational database security
program debugging
Engines
Safety
program verification
program diagnostics
software maintenance
security vulnerabilities
Libraries
tools
Metrics
composability
pubcrawl
Human behavior
Resiliency
Software
security
security of data
biblio
SeqFuzzer: An Industrial Protocol Fuzzing Framework from a Deep Learning Perspective
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
Protocols
learning (artificial intelligence)
Local area networks
modern industrial control systems
Policy Based Governance
policy-based governance
privacy
protocol frame structures
protocol frames
protocol verification
Industrial Safety
pubcrawl
security
security checks
security vulnerabilities
self learning
SeqFuzzer
stateful protocols
target protocol
vulnerability mining
deep learning perspective
composability
Compositionality
computer architecture
computer network security
Control Automation Technology devices
Data models
Decoding
deep learning
deep learning model
collaboration
EtherCAT
Fuzz Testing
fuzzing
fuzzing framework
industrial communication processes
industrial communication protocols
industrial network
industrial protocol fuzzing framework
biblio
Smarter Smart Contract Development Tools
Submitted by grigby1 on Fri, 03/27/2020 - 11:29am
program debugging
usability of programming languages
tools
software tools
software engineering
Software
smarter smart contract development
smart contracts
security vulnerabilities
security of data
Safe Coding
Resiliency
resilience
pubcrawl
Programming Language
blockchain
program compilers
policy-based governance
Metrics
Human Factors
Human behavior
contracts
Computer languages
Computer bugs
collaboration
buggy code
blockchain software engineering tool set
blockchain software development tools
blockchain platforms
blockchain environments
biblio
ICS/SCADA Device Recognition: A Hybrid Communication-Patterns and Passive-Fingerprinting Approach
Submitted by aekwall on Mon, 03/16/2020 - 10:29am
documentation
computerised monitoring
industrial control
industrial control system
SCADA Systems Security
Compositionality
TCPIP
defense augmentation
Device recognition
Object recognition
hybrid communication-patterns
ICS/SCADA device recognition
Industrial Control Systems
legacy ICS/SCADA systems
network data fingerprinting
passive-fingerprinting
SCADA fingerprinting
security of data
software maintenance
security vulnerabilities
Python
production engineering computing
Databases
pubcrawl
Human behavior
Resiliency
cyber-physical systems
supervisory control and data acquisition systems
SCADA systems
mobile computing
Protocols
security
Internet of Things
biblio
Security Vulnerability Metrics for Connected Vehicles
Submitted by grigby1 on Mon, 03/09/2020 - 2:38pm
security
vulnerable function assessment
vulnerability predication
vehicle software system
vehicle manufacturers
software testers
Software systems
software integration
software engineering
security vulnerability metrics
security vulnerabilities
security testing
security of data
Security Metrics
Measurement
pubcrawl
program testing
OpenPilot
Metrics
Measurement and Metrics Texting
Couplings
connected vehicles
complex software functionalities
Autopilot feature
Automotive engineering
automobiles
metrics testing
biblio
Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
android
vulnerabilities detection approach
system call
security vulnerabilities detection
security bugs
malicious Android application
detection process
detection algorithm
cyber attackers
Android security vulnerabilities
Android operating systems
system calls
anomaly detection techniques
Compositionality
Android (operating system)
security
vulnerability detection
Measurement
security vulnerabilities
Computer bugs
Anomaly Detection
Correlation
Metrics
machine learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
invasive software
Software
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »