Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Windows
biblio
Exploring the Possibility of USB based Fork Bomb Attack on Windows Environment
Submitted by grigby1 on Fri, 04/17/2020 - 11:28am
Metrics
Windows Operating System Security
Windows operating system
Windows environment
Windows
USB flash drive devices
USB based Fork Bomb attack
USB attack
system buses
security of data
Resiliency
resilience
pubcrawl
primary storage devices
operating systems (computers)
Arduino Pro Microdevice
memory performance
media exchanges
fork bomb
flash memories
electronic data interchange
digital storage
device drivers
data storage
data exchange devices
Computer crime
composability
Attack vectors
attack vector
biblio
An Innovative Model (HS) to Enhance the Security in Windows Operating System - A Case Study
Submitted by grigby1 on Fri, 04/17/2020 - 11:27am
NT LAN manager
Windows Registry
Windows Operating System Security
Windows operating system
Windows
SAM security account manager
SAM file protection
Resiliency
resilience
pubcrawl
privacy
password
NTLM
attacks
Microsoft Windows (operating systems)
Metrics
message authentication
login credentials
HS model
force attacks
dictionary attacks
Data Security
Data protection
data integrity
composability
authorisation
biblio
Improve Iot Security System Of Smart-Home By Using Support Vector Machine
Submitted by aekwall on Mon, 01/27/2020 - 10:19am
Accuracy
windows (construction)
Windows
support vector machine algorithm
smart-home system
Network
motors
Internet of Things security system
human resources preservation
human resource management
electrical products control
electric motors
doors
domestic safety
civil engineering computing
building occupants safety
security
Predictive Metrics
Switches
self-learning
Unsupervised Learning
Design engineering
Databases
composability
pubcrawl
Resiliency
machine learning
support vector machine
Support vector machines
machine learning algorithms
Internet of Things
Monitoring
biblio
A Malware Analysis and Artifact Capture Tool
Submitted by aekwall on Mon, 06/24/2019 - 2:41pm
microsoft windows
Windows
tools
Syntactics
static states
static analysis
source code (software)
sandbox
Resiliency
pubcrawl
process flow
obfuscation techniques
obfuscation
multiple code paths
Monitoring
artifact capture tool
Metrics
malware behavior
malware artifacts
Malware Analysis
malware
invasive software
interactive malware analysis
Human behavior
handwriting recognition
dynamic states
dynamic control
Disassemblers
Decompilers
debuggers
biblio
Comparing Web Cache Implementations for Fast O(1) Updates Based on LRU, LFU and Score Gated Strategies
Submitted by grigby1 on Wed, 01/16/2019 - 2:37pm
runtime performance
hit rate
hypermedia
implementation
information technology
least frequently used (LFU)
least recently used (LRU)
least recently used replacement principle
LRU replacement principle
network optimization criteria
performance optimization
high user request workloads
score gated LRU
score gated polling
score gated polling (SGP)
Score Gated strategies
transport protocols
web cache implementations
Web cache strategies
web caching strategies
window LFU
cache storage
Computational modeling
pubcrawl
Metrics
Resiliency
Scalability
Complexity theory
simulation
Logic gates
Conferences
internet
data structures
microsoft windows
Windows
Web Caching
achieved hit rate performance
arbitrary score assessment
cache performance
fast O(1) updates
fast updating
biblio
Development of a Secure, Heterogeneous Cloud Robotics Infrastructure: Implementing a Mesh VPN and Robotic File System Security Practices
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
secure cloud robotics infrastructure
multipoint-to-multipoint virtual private network
onboard processing power
open-source system
OpenVPN
pubcrawl
Resiliency
Robot Operating System
robot programming
Robot sensing systems
robotic file system security practices
ROS
mobile robots
security
security of data
Servers
TurtleBot
Ubuntu
UFW
Virtual private networks
vpn
Windows
Windows Operating System Security
heterogeneous mobile robotic platforms
android
Android (operating system)
Cloud Computing
Cloud Robotics
composability
Compositionality
control engineering computing
file organisation
Heterogeneous
heterogeneous cloud robotics infrastructure
Operating systems security
Human Factors
Internet of Things
ios
iOS (operating system)
iOS Security
IoT
Linux
mesh VPN
Metrics
Microsoft Windows (operating systems)
biblio
A tool to compute approximation matching between windows processes
Submitted by aekwall on Wed, 01/16/2019 - 2:08pm
digital forensics scenarios
Windows Operating System Security
windows processes
Windows memory dump
Windows
volatility
memory image file
image matching
Image forensics
forensics memory image
Forensics
forensic memory analysis
forensic analysis
file organisation
executable file
dumping process
tools
cryptographic hashing functions
cryptographic hash values
bytewise approximate matching
Binary codes
approximation matching algorithms
Approximation algorithms
Microsoft Windows (operating systems)
microsoft windows
Cryptography
malware
composability
Resiliency
Metrics
pubcrawl
biblio
BitLocker Full-Disk Encryption: Four Years Later
Submitted by aekwall on Wed, 01/16/2019 - 2:07pm
pubcrawl
Metrics
Resiliency
composability
bitlocker
encryption
Windows
Windows Operating System Security
biblio
A Content Auditing Method of IPsec VPN
Submitted by grigby1 on Wed, 11/14/2018 - 1:13pm
man-in-the-middle mechanism
Windows
VPN technology
Virtual private networks
Servers
Resiliency
resilience
public domain software
pubcrawl
prototype system
Protocols
operating systems (computers)
operating systems
microsoft windows
Metrics
encryption audits
IPv4 network environment
IPsec VPN users
IPsec VPN
IP networks
internet
encryption
DPDK technology
DPDK
default configuration
content auditing method
Compositionality
authentication
auditing
audit system
biblio
Cluster-Based Vulnerability Assessment Applied to Operating Systems
Submitted by grigby1 on Mon, 03/26/2018 - 12:58pm
Predictive models
Windows operating system
Windows
vulnerability records
vulnerability assessment
Stochastic processes
software reliability models
software reliability
Software
security
Resiliency
resilience
pubcrawl
clustering
OSs
operating systems
nonhomogeneous Poisson process
monotonic intensity function assumption
Metrics
mean value function
Linux
Databases
Curve fitting
Correlation
composability
« first
‹ previous
1
2
3
next ›
last »