Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software Architecture
biblio
The Privacy Case: Matching Privacy-Protection Goals to Human and Organizational Privacy Concerns
Submitted by grigby1 on Mon, 03/09/2020 - 1:57pm
Smart Grid
privacy goals
privacy protection
privacy-protection goals
privacy-related risks
pubcrawl
resilience
Resiliency
Safety
Scalability
privacy
smart grid data processing
Smart Grid Privacy
smart grid stakeholder
smart grid stakeholders
Smart Grids
smart power grids
Software Architecture
Stakeholders
goals structuring notation
Aspern Smart City Research project
automotive domain
Automotive engineering
Buildings
collaboration
composability
data privacy
goal structuring notation
argumentation thread
Human behavior
Human Factors
human privacy concern
Metrics
organizational privacy concern
policy-based governance
power engineering computing
Power system protection
biblio
FIXER: Flow Integrity Extensions for Embedded RISC-V
Submitted by aekwall on Mon, 02/24/2020 - 10:01am
integrated Rocket Custom Coprocessor
program compilers
security framework
RISC-V
buffer overflow
Code injection
coprocessors
fine-grained control-flow integrity
FIXER
flow integrity extensions for embedded RISC-V
return oriented programming
low-power embedded devices
open source architecture
RISC-V architecture
RISC-V processor core
RISC-V SoC platform
RISC-V toolchains
Rockets
security extension
shadow stack
Buffer overflows
Scalability
Internet of Things
data integrity
Hardware
security
embedded systems
reduced instruction set computing
system-on-chip
computer architecture
security of data
Resiliency
pubcrawl
composability
software reusability
Software Architecture
Bars
Human Factors
code reuse attacks
ROP
biblio
Mitigating Security Threats through the Use of Security Tactics to Design Secure Cyber-Physical Systems (CPS)
Submitted by grigby1 on Tue, 01/21/2020 - 11:09am
architectural tactics
collaboration
composability
ipv6 security
Metrics
policy-based governance
pubcrawl
quality attributes
resilience
Resiliency
security
security threats
Software Architecture
STRIDE
Trade-Offs
biblio
A Secure Fog-Cloud Based Architecture for MIoT
Submitted by aekwall on Mon, 01/20/2020 - 10:53am
medical data
Temperature sensors
Software Architecture
security of data
security issues
secure fog-cloud based architecture
Scalability
Resiliency
pubcrawl
Monitoring
MIoT devices
MIoT architectures
MIoT
Medical services
medical Internet of Things
attribute-based encryption
medical computing
medial data
Internet of Things
healthcare services
healthcare providers
Healthcare
health care
Fog Computing and Security
Fog computing
Data Security
computer architecture
Cloud Computing
Biomedical monitoring
biblio
A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures
Submitted by aekwall on Mon, 12/02/2019 - 11:08am
Microservices Security
Application Container Security
automatic code generation techniques
business capabilities
cyber risk
diversification index
economics-of-scale incentives
microservice architectures structure
microservices attack surfaces
program compilers
moving target defense mechanism
MSA
multistep attacks
security risk assessment
security risk-oriented software diversification
Transforms
compiler security
security of data
Compositionality
moving target defense
Security Metrics
business data processing
risk analysis
Logic gates
Indexes
Software Architecture
Measurement
Metrics
pubcrawl
Resiliency
Software
security
Scalability
biblio
Attack Modeling and Verification for Connected System Security
Submitted by aekwall on Wed, 05/01/2019 - 12:05pm
SysML connectivity profile
pubcrawl
Resiliency
security
security of data
Software Architecture
software tools
static system modeling
SysML
program verification
system security specifications
system specifications
system validation
system verification
systems engineering
Systems modeling
Temporal Logic
Unified modeling language
error propagation
Attack Modeling
composability
connected system security
critical systems
dynamic system modeling
Dynamical Systems
embedded systems
error detection
Adaptation models
extended attack tree
Formal Specification
IoT
Metrics
model checker
model checking
Petri nets
program diagnostics
biblio
Using Intel SGX to Protect Authentication Credentials in an Untrusted Operating System
Submitted by aekwall on Mon, 03/18/2019 - 8:49am
Software Guard Extensions
PAM authentication framework
password
password file protection scheme
private memory regions
privileged code
sensitive applications
SGX enclave
Software Architecture
OS kernel
TCB
trusted computing base
UniSGX
Unix
Unix systems
untrusted operating system
BIOS Security
Human behavior
Scalability
authorisation
encryption
telecommunication security
Hardware
Program processors
Trusted Computing
Resiliency
security of data
pubcrawl
Metrics
authentication
Intel SGX
authentication credentials
BIOS
computational security
biblio
Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems
Submitted by grigby1 on Thu, 02/14/2019 - 10:22am
cross-site scripting
expert systems
pubcrawl
resilience
Resiliency
Secure File Sharing
security
security patterns
Software Architecture
System recovery
Vulnerability
biblio
An SSH Honeypot Architecture Using Port Knocking and Intrusion Detection System
Submitted by grigby1 on Fri, 02/08/2019 - 3:38pm
Linux
SSH service attack
SSH honeypot architecture
Software Architecture
Servers
secure shell honeypot
secure shell
Scalability
Resiliency
resilience
pubcrawl
port knocking
operating systems
authentication
kippo honeypot
IP networks
intrusion detection system
IDS
Human Factors
Human behavior
honeypot
honey pots
Force
computer network security
Computer crime
biblio
A privacy-aware distributed software architecture for automation services in compliance with GDPR
Submitted by grigby1 on Mon, 01/21/2019 - 11:17am
privacy-aware software architecture
human-centric automation
human-machine collaboration
Law
legal regulation
legislation
Metrics
privacy
privacy breach protection
Privacy policy analysis for digital ecosystems
privacy-aware distributed software architecture
human behaviour analysis
pubcrawl
Resiliency
robots
secure communication
Security and Privacy in Digital Ecosystems
Software Architecture
virtualisation
virtualization privacy
virtualization techniques
distributed processing
authorisation
authorization
automation
automation services
Automation systems
composability
Cryptography
data breaches
Data protection
Databases
ART
distributes services
encryption
end-to-end encryption
EU citizens
factory automation
factory domain
GDPR compliance
General Data Protection Regulation
Human behavior
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »