Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software
biblio
Cyber attacks targeting Android cellphones
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
resilience
mobile attack approaches
Mobile communication
mobile computing
mobile phones
Primary Mobile Hack Builder
primary mobile hack builder software
pubcrawl
radiocommunication
Metrics
Resiliency
Scalability
security of data
smart phones
SMS information
Software
software based radio circuit
conversation eavesdropping
android encryption
Android operated cellphone control
Android smartphone
application based attacks
Application Based Mobile Attackers
Cameras
cellphone camera
computer software
Android (operating system)
Cyber Attacks
encryption
frequency based attacks
Frequency Based Mobile Attackers
GSM
Human behavior
Human Factors
biblio
An android application to secure text messages
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Mobile handsets
text-based communication type
text messages security
text messages
text analysis
Software
SMS
smart phones
short message service
Senior citizens
security of data
Scalability
Resiliency
resilience
pubcrawl
mobile phone users
Android (operating system)
mobile computing
Metrics
message content
Human Factors
Human behavior
graphical user interfaces
graphical user interface
encryption
electronic messaging
Elderly
confidentiality
communication
android encryption
Android application
biblio
Reliability, availability and security of computer systems supported by RFID technology
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
quantitative indicators
software reliability
Software
security of data
security
RFID technology
Resiliency
resilience
Reliability
radiofrequency identification
composability
pubcrawl
Microelectronic Security
Metrics
Hardware
Computers
computer systems security
computer systems reliability
computer systems availability
computer system quality
biblio
Cryptography classes in bugs framework (BF): Encryption bugs (ENC), verification bugs (VRF), and key management bugs (KMN)
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
secondary causes
program diagnostics
program verification
proximate causes
pubcrawl
related dynamic properties
resilience
Resiliency
rigorous definitions
Scalability
program debugging
soft-ware weaknesses
Software
software vulnerabilities
software weaknesses
taxonomy
tertiary causes
unambiguous definitions
verification bugs
VRF
cryptography related classes
authentication
attacks
bug classes
Bug taxonomy
bugs framework
clear descriptions
Computer bugs
Cryptography
cryptography classes
BF taxonomy
developed BF classes
ENC
encryption
Encryption bugs
Human behavior
key management
key management bugs
KMN
Metrics
biblio
Evolution of bitcoin and security risk in bitcoin wallets
Submitted by grigby1 on Thu, 02/15/2018 - 11:41am
human factor
Trusted Computing
trust factor
threats on bitcoin network
Software
security risk
Scalability
pubcrawl
Protocols
Peer-to-peer computing
Human Factors
bitcoin
Human behavior
electronic money
distributed consensus in bitcoin
block-chain rewriting
bitcoin wallets
bitcoin wallet
Bitcoin system
bitcoin security
bitcoin management
bitcoin evolution
biblio
Substation Monitoring to Enhance Situational Awareness \#x2014; Challenges and Opportunities
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
power system reliability
tools
system operator
suitable attack response
Substations
substation monitoring
sophisticated cyber attacks
Software
situational awareness
security of data
Resiliency
Reliability
recovery functions
pubcrawl
Protocols
power system security
composability
power grids
Power Grid
power engineering computing
Monitoring tools
monitoring substations
Monitoring
Metrics
malicious cyber activity
grid reliability
grid operators
grid operation
expert systems
energy management
cyber security
biblio
Improved trustworthiness judgment in open networks
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
Reliability
wireless sensor networks
uncertainty analysis
uncertainty
Trustworthy Systems
trustworthiness judgment
Trusted Computing
trust model
trust data
statistical trust value
statistical analysis
Software
security of data
Resiliency
collaboration
recommender systems
pubcrawl
Peer-to-peer computing
open systems
open networks
interactive success rate
Decision Making
cyber physical systems
Computational modeling
composability
collaborative recommendation mechanism
Collaborative recommendation
biblio
Analysis of software security testing using metaheuristic search technique
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
program testing
testing
tabu search
software security testing analysis
software assurance
Software
simulated annealing
security of data
security
search problems
Search Based Testing
Search Based Engineering
Scalability
pubcrawl
composability
particle swarm optimization techniques
particle swarm optimisation
metaheuristic search technique
metaheuristic
hill climbing
heuristic search technique
heuristic
genomics
genetic algorithms
genetic algorithm
fitness function
cost effective
Conferences
biblio
Theoretical Feasibility of Statistical Assurance of Programmable Systems Based on Simulation Tests
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
simulated hardware platform
ultra-high reliability levels
theoretical feasibility
testing
test time expansion problem
Test Time Expansion
statistical testing
statistical test
statistical assurance
statistical analysis
software-intensive system
software reliability
software assurance
Software
simulation tests
composability
Scalability
reliability theory
Reliability
pubcrawl
protection system
programmable systems
program testing
platform simulation approach
Hardware
Failure Probability
estimation
Emulation/Simulation-enhanced Test
empirical failure probability estimation
continuous operation systems
biblio
Managing Assurance Cases in Model Based Software Systems
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
pubcrawl
vehicle control
traffic engineering computing
tools
Standards organizations
software quality
software development organizations
software assurance
Software
social networks
Scalability
Safety
road vehicles
road safety
reuse
regulatory compliance
assurance cases
model management techniques
model management
model based software systems
ISO standards
ISO 26262 standard
impact assessment
functional safety
financial service
Context
composability
compliance management
co-evolution
Automotive engineering
automotive domain
automobiles
« first
‹ previous
…
64
65
66
67
68
69
70
71
72
…
next ›
last »