Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security weaknesses
biblio
Weakness Identification and Flow Analysis Based on Tor Network
Submitted by aekwall on Mon, 08/26/2019 - 9:08am
Router Systems Security
darknet
Human behavior
Metrics
network traffic analysis
policy-based governance
pubcrawl
resilience
security weaknesses
SVM
The Onion Router
biblio
Solving Internet's Weak Link for Blockchain and IoT Applications
Submitted by aekwall on Mon, 08/26/2019 - 9:07am
Internet of Things
authentication
blockchain
Cryptography
Decentralized Security
Digital signing
encryption
Hardware Security
Human behavior
security weaknesses
IoT
Key storage
Metrics
policy-based governance
Private keys
pubcrawl
resilience
SECP256K1
biblio
A Framework for Data-Driven Physical Security and Insider Threat Detection
Submitted by aekwall on Mon, 08/26/2019 - 9:07am
pubcrawl
organizational security policies
Organizations
physical security
physical security architecture
Physical Security Definition
policy-based governance
provenance graphs
PSO
ontologies (artificial intelligence)
resilience
risk management
rule-based anomaly detection
security of data
Security Ontology
Security Provenance
security provenance solution
security weaknesses
Human behavior
Anomaly Detection
Attack Pattern Reconstruction
data analysis
Data Analytics
data-driven physical security
Digital Forensics
forensic data analysis
Forensics
Access Control
insider threat
Insider Threat Detection
insider threats mitigation
intrusion attempts
Metrics
ontological framework
Ontologies
biblio
Security Weaknesses and Attacks on the Internet of Things Applications
Submitted by aekwall on Mon, 08/26/2019 - 9:07am
privacy
wireless sensor networks
Smart homes
Smart Home
smart farm
smart car
smart campus
security weaknesses
security of data
security
resilience
pubcrawl
Protocols
Data collection
policy-based governance
objects information
Metrics
IoT environment
IoT devices
IoT attacks
IoT applications
Internet of Things applications
Internet of Things
internet
Human behavior
Healthcare
biblio
Weak-Assert: A Weakness-Oriented Assertion Recommendation Toolkit for Program Analysis
Submitted by aekwall on Mon, 08/26/2019 - 9:07am
program weakness
tools
testing
Syntactics
Software
security weaknesses
security
resilience
pubcrawl
assertion recommendation
program testing
policy-based governance
pattern matching
Metrics
Human behavior
Hardware
formal program verifcation
biblio
Security weakness of a lattice-based key exchange protocol
Submitted by aekwall on Mon, 08/26/2019 - 9:07am
Protocols
Metrics
MITM Attack
network security field
nonDH type key exchange protocol
NTRU-ENCRYPT
NTRU-KE
NTRU-SIGN
policy-based governance
private key cryptography
man-in-the-middle attack
pubcrawl
public key cryptography
quantum attacks
quantum computing
resilience
Resists
Secret key
security weaknesses
telecommunication security
Human behavior
Computing Technology
cryptanalysis
Cryptographic Protocols
DH problem
DH-HEMTs
Diffie-Hellman problem
digital signatures
exponential attacks
grid computing
authentication mechanism
information field
information technology
Key exchange
lattice cryptography
lattice-based key exchange protocol
Lattices
Lei
Liao
biblio
Architectural Security Weaknesses in Industrial Control Systems (ICS) an Empirical Study Based on Disclosed Software Vulnerabilities
Submitted by aekwall on Mon, 08/26/2019 - 9:07am
industrial control
supervisory control
Software
security weaknesses
security of data
security
SCADA systems
SCADA configuration
resilience
pubcrawl
policy-based governance
PLC
Metrics
internet
integrated circuits
Industrial Control Systems
architectural root cause
industrial automation
improper input validation
ICS systems
human-machine interfaces
Human Factors
Human behavior
disclosed software vulnerabilities
Data mining
data acquisition
control systems
computer architecture
component-based architectures
common security architectural weaknesses
common architectural security weaknesses
authorisation
biblio
A Position Study to Investigate Technical Debt Associated with Security Weaknesses
Submitted by aekwall on Mon, 08/26/2019 - 9:06am
common weakness scoring system
security of data
security
Software
Software measurement
Human behavior
pubcrawl
policy-based governance
Metrics
tools
Companies
static analysis
software development management
catching vulnerabilities
Common Weakness Enumeration
resilience
CWSS scores
decidedly negative impacts
design level CWE
exploitable weaknesses
five-step approach
potential security breaches
quality assurance
Quamoco quality model
scoring mechanism
security weaknesses
software lifecycle
software quality
TD
technical debt
biblio
Studying TLS Usage in Android Apps
Submitted by grigby1 on Wed, 05/30/2018 - 3:02pm
pubcrawl
Transport Layer Security
Transport Layer Protocols
TLS
SSL
security weaknesses
security protocols
Secure Sockets Layer
Resiliency
resilience
android
policy-based governance
network measurements
Mobile Security
mobile
Metrics
Human Factors
Human behavior
collaboration
biblio
Malware Classification and Class Imbalance via Stochastic Hashed LZJD
Submitted by grigby1 on Wed, 05/30/2018 - 3:02pm
collaboration
cyber security
Human behavior
Human Factors
lzjd
malware classification
Metrics
policy-based governance
pubcrawl
resilience
Resiliency
security weaknesses
shwel
« first
‹ previous
1
2
3
4
5
next ›
last »