Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer crashes
biblio
Code Mutation as a mean against ROP Attacks for Embedded Systems
Submitted by aekwall on Fri, 02/17/2023 - 10:39am
biological systems
code permutation
codes
composability
Computer crashes
embedded computing
embedded systems
Human Factors
pubcrawl
Resiliency
ROP attack
rop attacks
Scalability
security
Sociology
Statistics
biblio
Default: Mutual Information-based Crash Triage for Massive Crashes
Submitted by grigby1 on Fri, 01/13/2023 - 12:49pm
security
Neural networks
pubcrawl
resilience
Resiliency
Scalability
fuzzing
Computer bugs
Software algorithms
software security
Security by Default
Computer crashes
location awareness
Crash Triage
biblio
OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept
Submitted by aekwall on Thu, 05/19/2022 - 1:39pm
Software
pubcrawl
Metrics
composability
Ecosystems
taint analysis
C++ languages
Computer crashes
Proofs-of-Concept
Symbolic Execution
Vulnerability Propagation
biblio
A Write-Friendly and Fast-Recovery Scheme for Security Metadata in Non-Volatile Memories
Submitted by grigby1 on Tue, 03/22/2022 - 1:45pm
pubcrawl
resilience
Resiliency
metadata
Memory management
energy consumption
Random access memory
System performance
Computer crashes
integrity tree
Nonvolatile memory
NVM
System recovery
biblio
An Efficient Database Backup and Recovery Scheme using Write-Ahead Logging
Submitted by grigby1 on Tue, 08/31/2021 - 11:06am
Human behavior
Write-Ahead Logging
Resiliency
resilience
relational database security
pubcrawl
Metrics
Instruction sets
i-o systems security
Cloud Computing
Database systems
database management system
Database Backup and Recovery
Data mining
data management
Conferences
Computer crashes
composability
biblio
IFFSET: In-Field Fuzzing of Industrial Control Systems using System Emulation
Submitted by grigby1 on Tue, 08/17/2021 - 3:57pm
composability
Computer crashes
emulation
fuzzing
industrial control
integrated circuits
Kernel
Linux operating system
Linux Operating System Security
Metrics
performance evaluation
pubcrawl
resilience
Resiliency
security
biblio
Multi-Authority CP-ABE with Dynamical Revocation in Space-Air-Ground Integrated Network
Submitted by aekwall on Tue, 05/25/2021 - 3:18pm
Scalability
encryption
computer architecture
pubcrawl
policy-based governance
Synchronization
Data Security
Complexity theory
Heuristic algorithms
Computer crashes
CP-ABE
Dynamical Key Revocation (DKR)
Multi-Authority CP-ABE (MA-CP-ABE)
Space-air-ground integrated network (SAGIN)
biblio
Research and implementation of network attack and defense countermeasure technology based on artificial intelligence technology
Submitted by grigby1 on Thu, 05/13/2021 - 11:57am
Data mining
Security Detection Technology
network attack and defense
information security risk
Computer crashes
artificial intelligence technology
artificial intelligence security
Task Analysis
Artificial Intelligence
risk management
composability
Communication networks
Resiliency
resilience
Metrics
Human behavior
pubcrawl
security
biblio
Research on Mobile Application Local Denial of Service Vulnerability Detection Technology Based on Rule Matching
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
formal verification
static detection method
smali abstract syntax tree
rule matching
mobile-application
mobile application market
malicious application flooding
local denial of service vulnerability detection technology
hook verification
dynamic detection method
-static-detection
-security-vulnerability
-rule-matching
-dynamic-detection
Computer crashes
Monitoring
Compositionality
smart phones
vulnerability detection
Communication networks
Mobile Applications
pattern matching
Metrics
pubcrawl
Human behavior
Resiliency
feature extraction
mobile computing
invasive software
security
biblio
SENAD: Securing Network Application Deployment in Software Defined Networks
Submitted by aekwall on Mon, 12/02/2019 - 12:04pm
network programmability
app-to-control threats
application plane controller
Computer crashes
data plane controller
DPC
dubbed SENAD
malicious command injection
network application deployment
APC
OpenFlow entries
resource exhaustion attack
resource isolation
SDN architecture
Software Defined Networks
telecommunication control
telecommunication network management
Resiliency
Access Control
authorisation
authorization
Runtime
Software
computer architecture
computer network management
software defined networking
computer network security
pubcrawl
composability
Metrics
SDN controller
process control
network management
command injection attacks
1
2
next ›
last »