Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software
biblio
Security-Enhanced Signaling Scheme in Software Defined Optical Network
Submitted by grigby1 on Wed, 09/11/2019 - 2:44pm
security level
pubcrawl
public key cryptography
public key infrastructure
resilience
Resiliency
SDON
security
security improvement
Protocols
security-enhanced signaling
security-enhanced signaling procedure
Software
software defined networking
Software Defined Networks
software defined optical network
telecommunication security
telecommunication signalling
internet
communication security issue
composability
connection success rate performance
Cryptographic Protocols
current OpenFIow protocol
digital signatures
end-to-end trusted service connection
Energy Internet services
backbone optical networks
large-scale optical network
message feedback
Metrics
Microelectronics Security
openflow protocols
Optical feedback
Optical fiber networks
optical switches
biblio
Cross-Stack Threat Sensing for Cyber Security and Resilience
Submitted by grigby1 on Mon, 08/26/2019 - 11:10am
Intrusion Detection
Weapons
tactical deception capabilities
Software
Servers
sensors
security of data
security
Routing
Resiliency
resilience
pubcrawl
Production
national interest networks
cyber security
honeypots
equipping applications
deceptive attack-response capabilities
deception
cyber-threat data
active mitigation capabilities
composability
Cross Layer Security
cross-stack sensor framework
cross-stack threat sensing
Cyber Operations
cyber resilience
biblio
Weak-Assert: A Weakness-Oriented Assertion Recommendation Toolkit for Program Analysis
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
program weakness
tools
testing
Syntactics
Software
security weaknesses
security
resilience
pubcrawl
assertion recommendation
program testing
policy-based governance
pattern matching
Metrics
Human behavior
Hardware
formal program verifcation
biblio
Architectural Security Weaknesses in Industrial Control Systems (ICS) an Empirical Study Based on Disclosed Software Vulnerabilities
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
industrial control
supervisory control
Software
security weaknesses
security of data
security
SCADA systems
SCADA configuration
resilience
pubcrawl
policy-based governance
PLC
Metrics
internet
integrated circuits
Industrial Control Systems
architectural root cause
industrial automation
improper input validation
ICS systems
human-machine interfaces
Human Factors
Human behavior
disclosed software vulnerabilities
Data mining
data acquisition
control systems
computer architecture
component-based architectures
common security architectural weaknesses
common architectural security weaknesses
authorisation
biblio
A Position Study to Investigate Technical Debt Associated with Security Weaknesses
Submitted by aekwall on Mon, 08/26/2019 - 10:06am
common weakness scoring system
security of data
security
Software
Software measurement
Human behavior
pubcrawl
policy-based governance
Metrics
tools
Companies
static analysis
software development management
catching vulnerabilities
Common Weakness Enumeration
resilience
CWSS scores
decidedly negative impacts
design level CWE
exploitable weaknesses
five-step approach
potential security breaches
quality assurance
Quamoco quality model
scoring mechanism
security weaknesses
software lifecycle
software quality
TD
technical debt
biblio
Access Control Policy Enforcement for Zero-Trust-Networking
Submitted by grigby1 on Mon, 08/05/2019 - 11:39am
Scalability
policy enforcement
policy enforcement framework
policy-based governance
Production
pubcrawl
resilience
Resiliency
rigorous access control
risk-based access control
risk-based access control decision making
network zone
securing computer networks
Software
transaction-based interactions
trust
virtualized infrastructures
zero trust
zero trust networking
zero-trust-networking
zone resources
ZTN networks
Firewalls (computing)
access control process
authorisation
authorization
computer network management
computer network security
computer networks
Decision Making
dynamicity
enterprise computing landscape
firewall
access control policy enforcement
fog/edge computing
generic firewall policy language
heterogeneous user contexts
Human behavior
Human Factors
industrial internet
Internet of Things
micro-segment
network topology
biblio
Is Predicting Software Security Bugs Using Deep Learning Better Than the Traditional Machine Learning Algorithms?
Submitted by aekwall on Mon, 07/01/2019 - 10:14am
Predictive models
Support vector machines
software security bugs
software quality metrics
software quality
software metrics
software insecurity
Software
security-related bugs
security of data
Security Metrics
security breaches
security
Random Forest
pubcrawl
program debugging
predictive security metrics
Naive Bayes
multilayer deep feedforward network
Metrics
machine learning
learning (artificial intelligence)
feedforward neural nets
Feedforward Artificial Network
deep learning technique
deep learning
Decision trees
Decision Tree
Computer bugs
Bug Propensity Correlational Analysis
Bayes methods
biblio
Scalable Verification Framework for C Program
Submitted by grigby1 on Fri, 06/28/2019 - 10:36am
scalability issues
property-guided program slicing
pubcrawl
quality assurance
resilience
Resiliency
Safety
safety critical areas
Scalability
program verification problem
scalable verification
scalable verification framework
Software
Software systems
structural abstraction
Through-silicon vias
TSV
abstraction refinement
program verification
Program slicing
program compilers
optimization
model checking
Metrics
memory consumption
lines-of-code
extended structural abstraction
context aware software verification
Compositionality
Complexity theory
C program verifiers
C language
automatic software verification framework
biblio
Enhancing Security and Scalability in Software Defined LTE Core Networks
Submitted by aekwall on Mon, 06/17/2019 - 10:29am
next generation networks
telecommunication traffic
telecommunication security
software defined networking
software defined LTE core networks
Software
security scalability
security enhancement
security
scalable tunnel establishment
scalable channel security scheme
Scalability
pubcrawl
cellular radio
Next generation networking
next generation cellular network
mobile subscribers
Mobile Security
mobile networks
mobile network design
Mobile communication
LTE core network
Long Term Evolution
Local area networks
composability
Cloud Computing
biblio
VMPBL: Identifying Vulnerable Functions Based on Machine Learning Combining Patched Information and Binary Comparison Technique by LCS
Submitted by grigby1 on Mon, 06/10/2019 - 1:55pm
privacy
vulnerable-patched functions
vulnerable functions
vulnerability types
Vulnerability
VMPBL
tools
source files
software security
Software
security of data
security
Resiliency
resilience
real-world CWE vulnerabilities
pubcrawl
binary comparison
patched information
patch file
open source code
machine learning algorithms
machine learning
learning (artificial intelligence)
knowledge database
K-Trace algorithm
feature extraction
database management systems
composability
commas software security
Classification algorithms
binary comparison technique
« first
‹ previous
…
57
58
59
60
61
62
63
64
65
…
next ›
last »