Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Diversity methods
biblio
Evaluating Software Diversity Based on Gadget Feature Analysis
Submitted by grigby1 on Fri, 09/01/2023 - 2:50pm
Software measurement
security gain
JavaScript engine
gadget feature
Information Reuse
codes
software diversity
Gain measurement
Compositionality
security
Diversity methods
code reuse attack
programming
composability
Software
Resiliency
resilience
pubcrawl
biblio
Improving Anomaly Detection with a Self-Supervised Task Based on Generative Adversarial Network
Submitted by grigby1 on Thu, 08/03/2023 - 2:12pm
signal processing
Anomaly Detection
pubcrawl
Metrics
resilience
Resiliency
Conferences
Scalability
Data models
Diversity methods
Task Analysis
generative adversarial networks
Generative Adversarial Learning
interpolation
annotations
self-supervision
biblio
An Approach of Code Pointer Hiding Based on a Resilient Area
Submitted by grigby1 on Mon, 03/23/2020 - 3:58pm
Information systems
source code (software)
Software
security of data
security
Scalability
rop attacks
resilient area
resilience
pubcrawl
pointer hiding
Payloads
memory disclosure vulnerability
Layout
Information Reuse and Security
information system security
Human Factors
Human behavior
flow graphs
Diversity methods
composability
code reuse attack
code reuse
code randomization
code pointer hiding
attack scenario
Resiliency
Compositionality
biblio
Scalable Security Models for Assessing Effectiveness of Moving Target Defenses
Submitted by BrandonB on Tue, 05/05/2015 - 11:16am
internet
security of data
Security Modeling Techniques
security assessment
Security analysis
security
scalable security models
networked system security
MTD
moving target defenses
moving target defense
Measurement
Linux
Analytical models
IMs
importance measures
hierarchical attack representation models
HARMs
graph theory
exhaustive search method
effectiveness assessment
Diversity methods
Computational modeling
Attack Representation Model
attack graphs