Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Containers
biblio
A Distributed Trust Layer for Edge Infrastructure
Submitted by grigby1 on Wed, 08/03/2022 - 3:14pm
Logic gates
Cloud Computing
security
blockchain
pubcrawl
Computational modeling
Industries
composability
Containers
Measurement
trust
trustworthiness
Soft sensors
MEC
Multi-access Edge Computing
biblio
Predicting gray fault based on context graph in container-based cloud
Submitted by grigby1 on Thu, 06/09/2022 - 1:30pm
Cloud Computing
pubcrawl
Human Factors
resilience
Resiliency
Containers
fault tolerance
Fault tolerant systems
Loss measurement
Scalability
fault prediction
Prediction methods
intrusion tolerance
container-based cloud
context graph
gray fault
biblio
Implementing a Method for Docker Image Security
Submitted by grigby1 on Thu, 05/12/2022 - 9:49am
Cryptography
information security
pubcrawl
Resiliency
telecommunication traffic
composability
static analysis
malware
Containers
Virtualization
resilience
dynamic analysis
cyber physical systems
virtual machine security
docker container security
docker image security
biblio
Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)
Submitted by aekwall on Tue, 04/19/2022 - 10:16am
cross layer attack
Cross Layer Security
UDP
stub resolver
Psuedo Random Number Generator
open systems
Kernel
IP ID
flow label
DNS cache poisoning
device tracking
Cross layer design
Protocols
pubcrawl
android
PRNG
Object recognition
Prediction algorithms
TCP
composability
Resiliency
Linux
Containers
biblio
Container-based Service State Management in Cloud Computing
Submitted by grigby1 on Mon, 03/14/2022 - 11:17am
Cloud Computing
pubcrawl
collaboration
Heuristic algorithms
composability
Containers
sandboxing
quality of service
Policy Based Governance
Linear programming
container
checkpointing
data centers
Container Migration
service management
State Management
biblio
Security Audit of Docker Container Images in Cloud Architecture
Submitted by grigby1 on Tue, 01/25/2022 - 3:54pm
Containers
use cases
Packaging
container security verification
Application Container Security
Automated Secure Software Engineering
Docker
Market research
microservices
tools
maintenance engineering
composability
security audit
NIST
Resiliency
resilience
pubcrawl
Cloud Computing
biblio
Reducing Docker Daemon Attack Surface Using Rootless Mode
Submitted by grigby1 on Tue, 01/11/2022 - 9:34am
attack surface
container
Containers
daemon
Docker
information management
Metrics
privilege
pubcrawl
resilience
Resiliency
root
rootless
Scalability
scientific computing
Virtualization
biblio
Trust, Security and Privacy through Remote Attestation in 5G and 6G Systems
Submitted by grigby1 on Tue, 12/21/2021 - 2:22pm
privacy
zero trust
Trusted Computing
trust
tpm
security
Scalability
Resiliency
resilience
Rail transportation
pubcrawl
5G mobile communication
policy-based governance
Human Factors
Human behavior
Containers
collaboration
Cloud Computing
cloud
attestation
6G mobile communication
biblio
A Kubernetes CI/CD Pipeline with Asylo as a Trusted Execution Environment Abstraction Framework
Submitted by grigby1 on Mon, 12/20/2021 - 12:18pm
Kubernetes
Virtual machining
trusted execution environment (TEE)
Tekton
security
Resiliency
resilience
pubcrawl
Pipelines
Organizations
Metrics
Air gaps
Kaniko
Human behavior
Harbor
devsecops
continuous integration / continuous deployment (CI/CD)
Containers
Conferences
composability
Cloud Computing
Asylo
biblio
Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning
Submitted by aekwall on Mon, 11/29/2021 - 12:59pm
Computational modeling
Data models
Perturbation methods
Training
Servers
Containers
pubcrawl
Scalability
Resiliency
Adversarial Machine Learning
data privacy
blacklisting
domain generation algorithms
Long short-term memory
signature based defense
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »