Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software
biblio
Secure IoT for a Pervasive Platform
Submitted by grigby1 on Tue, 11/26/2019 - 3:42pm
pubcrawl
ubiquitous computing
software elements
Software
smart communication-enable devices
Servers
security
secure IoT
secure element
Scalability
Resiliency
resilience
public key infrastructure
public key cryptography
Public key
computer architecture
pervasive systems
pervasive platform
Pervasive Computing Security
pervasive computing
pervasive applications
Metrics
Internet of Things
Human Factors
human factor
Human behavior
Hardware
end-to-end security level
computer network security
biblio
An Evaluation of the Security of the Bitcoin Peer-To-Peer Network
Submitted by grigby1 on Tue, 11/26/2019 - 3:38pm
Human Factors
transaction confirmation process
Software
service attacks
Security Evaluation
Scalability
Resiliency
resilience
pubcrawl
Protocols
Peer-to-peer computing
peer to peer security
P2P network
network protocol
network message exchanges
Metrics
bitcoin
human factor
Human behavior
distributed denial of service attacks
denial of service
DDoS Attacks
Data mining
Cryptographic Protocols
cryptocurrencies
computer network security
Computer crime
blockchain
Bitcoin peer-to-peer network
bitcoin mining process
bitcoin message exchanges
bitcoin core software
file
Privacy Enhancing Framework to Advance Models of Behavior
Submitted by Nabil Alshurafa on Mon, 11/25/2019 - 1:04pm. Contributors:
Nabil Alshurafa
Josiah Hester
Aggelos Katsaggelos
Bonnie Spring
Andrea Graham
Posters
cyber-physical systems
data science
Applied Privacy
Usability and Human Interaction
Software
1915847
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
psilence: an R Library for Differential Privacy
Submitted by James Honaker on Mon, 11/25/2019 - 1:04pm. Contributors:
James Honaker
Thomas Brawner
Christian Covington
Ira Globus-Harris
Posters
Applied Privacy
Software
data science
1565387
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
Comparing Traditional Machine Learning and Deep Learning Approaches for Security Vetting of Android Apps
Submitted by xinmingou on Mon, 11/25/2019 - 1:04pm. Contributors:
Xinming Ou
Doina Caragea
Sankardas Roy
Guojun Liu
Emily Alfs
Dewan Chaulagain
Posters
Software
1717862
1717871
1718214
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
Formal Verification Technology for Asynchronous Communication Protocol
Submitted by grigby1 on Tue, 11/12/2019 - 4:29pm
policy-based governance
verification work efficiency
UART communication
traditional simulation method
Software
pubcrawl
PSL
Protocols
protocol verification
property
product design quality
Product design
process control
privacy
aerospace FPGA software products
formal verification technology
formal verification
field programmable gate arrays
Compositionality
composability
complete verification process
collaboration
Clocks
blind spots
asynchronous communication protocol
asynchronous communication
assert
biblio
Cross-Entropy: A New Metric for Software Defect Prediction
Submitted by grigby1 on Tue, 11/12/2019 - 4:26pm
pubcrawl
Task Analysis
source code (software)
source code
software repository
software quality assurance
software quality
software metrics
software defect prediction
software bugs
Software
Semantics
recurrent neural network language model
recurrent neural nets
code metric
program debugging
predictive security metrics
Predictive models
natural language processing
Metrics
Measurement
language model
Entropy
DefectLearner
deep learning
cross-entropy
Computer bugs
code naturalness
biblio
Mining Software Repositories for Predictive Modelling of Defects in SDN Controller
Submitted by grigby1 on Tue, 11/12/2019 - 4:26pm
predictive modelling
Stochastic processes
software release management
software metrics
software development management
software defined networking control plane
software defined networking
software defect metrics
Software
security
Reliability
public domain software
pubcrawl
Protocols
program debugging
production grade SDN controller
predictive security metrics
OpenDaylight architecture
open source SDN controller platform
network operating system
mining software repositories
Metrics
Git version control system
Data mining
control systems
Configuration Management
computer network management
Computer bugs
bug repository
bug removal rates
bug manifestation
bug characteristics
biblio
A Survey of Return-Oriented Programming Attack, Defense and Its Benign Use
Submitted by grigby1 on Mon, 11/04/2019 - 12:34pm
ROP Defense
programming
pubcrawl
Randomization
Registers
resilience
return-oriented programming
return-oriented programming attack
rop attacks
OS
Scalability
security mechanisms
security of data
Software
software watermarking
Steganography
Watermarking
defense mechanisms
Compositionality
Resiliency
Benign Use of ROP
code integrity verification
code reuse attack
composability
computer security
Control Flow Integrity
Information Reuse and Security
extended ROP attack
frequency control
Human behavior
Human Factors
Layout
operating system
operating systems (computers)
biblio
IoTSM: An End-to-End Security Model for IoT Ecosystems
Submitted by grigby1 on Wed, 10/30/2019 - 10:30am
security
IoTSM
Metrics
Pervasive Computing Security
pubcrawl
Resiliency
Scalability
Science of Security
secure development
IoT security model
security model
security of data
Security Practices
Software
software assurance
software assurance maturity model framework
telecommunication security
Internet of Things
Companies
comparability
composability
Ecosystems
end-to-end IoT security
end-to-end security
end-to-end security model
Human behavior
collaboration
Interviews
IoT
IoT devices
IoT ecosystems
IoT organizations
IoT practitioners
IoT security
« first
‹ previous
…
53
54
55
56
57
58
59
60
61
…
next ›
last »