Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ecosystems
biblio
Watchman: Monitoring Dependency Conflicts for Python Library Ecosystem
Submitted by aekwall on Mon, 02/08/2021 - 1:40pm
Monitoring
Scalability
Resiliency
pubcrawl
Metrics
tools
Libraries
automation
Python
software engineering
Ecosystems
software ecosystem
Human Factors
Compositionality
Cyber Dependencies
dependency conflicts
biblio
The Plug-and-Play Electricity Era: Interoperability to Integrate Anything, Anywhere, Anytime
Submitted by aekwall on Mon, 09/14/2020 - 12:27pm
Communication equipment
composability
successful electric power system component connection
power system equipment
power apparatus
plug-and-play electricity era
organizational structures
Interoperation
integrated operational challenges
inforrmation age
Electricity supply industry
electric system components
electric power engineering
electric power devices
coordinated operations
computer-based automation systems
security
attaching wires
associated sensing
architectural impacts
architectural concepts
communication technology
environmental factors
open systems
energy management
interoperability
power system reliability
power engineering computing
Ecosystems
power grids
organisational aspects
pubcrawl
biblio
Tracking location privacy leakage of mobile ad networks at scale
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
extensive threat measurements
privacy models and measurement
targeted ad deliveries
privacy leakage threats
potential privacy leakage
online advertising ecosystem
mobile ads
mobile ad networks
mobile ad ecosystem
mobile ad businesses privacy leakage behaviors
massive data collection
location-based mobile advertising services
large-scale measurement study
security of data
advertising data processing
advertising
adaptive location obfuscation mechanism
location data
Ecosystems
Metrics
privacy
Google
pubcrawl
mobile computing
Adaptation models
data privacy
biblio
Tracking location privacy leakage of mobile ad networks at scale
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
extensive threat measurements
privacy models and measurement
targeted ad deliveries
privacy leakage threats
potential privacy leakage
online advertising ecosystem
mobile ads
mobile ad networks
mobile ad ecosystem
mobile ad businesses privacy leakage behaviors
massive data collection
location-based mobile advertising services
large-scale measurement study
security of data
advertising data processing
advertising
adaptive location obfuscation mechanism
location data
Ecosystems
Metrics
privacy
Google
pubcrawl
mobile computing
Adaptation models
data privacy
biblio
Does Certificate Transparency Break the Web? Measuring Adoption and Error Rate
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
malicious certificates
Web sites
Error analysis
Certificate-Transparency
Computed tomography
CT
error rate
Google Chrome web browser
HTTPs
Compositionality
misissued certificates
search engines
security benefits
usable-security
Web-PKI
websites
Web Browser Security
security of data
Browsers
certificate transparency
Metrics
online front-ends
composability
internet
Ecosystems
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Servers
Monitoring
security
biblio
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists
Submitted by grigby1 on Fri, 04/17/2020 - 10:44am
resilience
mobile computing
modern phishing websites
native blacklisting
Organizations
PhishFarm framework
Phishing
phishing attacks
phishing kits
pubcrawl
mobile browsers
Resiliency
security
security of data
unsolicited e-mail
Web Browser Security
Web browsers
Web sites
web-browser
diverse cloaking techniques
anti-phishing-ecosystem
blacklisting
browser blacklists
browser phishing blacklists
Browsers
Cloaking
composability
Compositionality
Computer crime
anti-phishing entities
Ecosystems
evasion techniques
HTTP request
Human behavior
Human Factors
internet
live phishing sites
Metrics
biblio
A Residential Client-Side Perspective on SSL Certificates
Submitted by grigby1 on Mon, 02/10/2020 - 11:31am
shorter average chain length
public key infrastructure
residential client-side
resilience
Resiliency
root certificates
Scalability
secure web connection setup
Servers
public key cryptography
SSL certificate chains
SSL certificates
SSL Trust Models
telecommunication traffic
transport protocols
untrusted root certificate
valid certificates
2M residential client machines
Public key
pubcrawl
Protocols
operating systems
Metrics
invalid certificate chains
internet
Human Factors
Human behavior
Ecosystems
computer network security
certification
certificate characteristics
Browsers
35M unique certificate chains
biblio
An Assessment of Blockchain Identity Solutions: Minimizing Risk and Liability of Authentication
Submitted by grigby1 on Tue, 01/21/2020 - 11:35am
personally identifiable information
Identity Ecosystem
identity ecosystem model
Identity management
identity management services
identity management solutions
identity theft
identity verification document
organizational information
identity
PII options
privacy
Privacy Policy
pubcrawl
resilience
Scalability
secure identity solution
data privacy
authentication choices
blockchain
blockchain attestations
blockchain identity solutions
blockchain technology
blockchain-based identity solution
Cryptography
Data models
authentication
decentralized ledger system
Distributed databases
Ecosystems
fraud
fraud stories
Guidelines
Human behavior
biblio
Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure
Submitted by aekwall on Mon, 11/18/2019 - 11:48am
contracts
PKI Trust Models
trust experience
smart contract-assisted public key infrastructure
smart contract-assisted PKI extension
PKI
dynamic trust state
dynamic trust network
dynamic trust management
Decentralized Trust
CT
certification
certificate transparency
certificate authority
Browsers
Scalability
public key cryptography
Public key
digital signatures
Policy
Ecosystems
smart contract
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
Trusted Computing
Protocols
biblio
IoTSM: An End-to-End Security Model for IoT Ecosystems
Submitted by grigby1 on Wed, 10/30/2019 - 10:30am
security
IoTSM
Metrics
Pervasive Computing Security
pubcrawl
Resiliency
Scalability
Science of Security
secure development
IoT security model
security model
security of data
Security Practices
Software
software assurance
software assurance maturity model framework
telecommunication security
Internet of Things
Companies
comparability
composability
Ecosystems
end-to-end IoT security
end-to-end security
end-to-end security model
Human behavior
collaboration
Interviews
IoT
IoT devices
IoT ecosystems
IoT organizations
IoT practitioners
IoT security
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »