Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Microprogramming
biblio
Protection Profile Bricks for Secure IoT Devices
Submitted by grigby1 on Thu, 08/04/2022 - 5:04pm
Internet of Things
security
Monitoring
pubcrawl
resilience
Resiliency
privacy
Object recognition
Communication system security
composability
Microprogramming
lighting
design for testability
trusted platform modules
biblio
A TPCM-Based Trusted PXE Boot Method For Servers
Submitted by grigby1 on Mon, 11/08/2021 - 1:44pm
resilience
trusted startup
trusted platform modules
Trusted Platform Module
trusted platform control module
Trusted Computing
standards
Servers
security
Resiliency
pubcrawl
Publishing
Microprogramming
Linux
level measurement
information security
cyber physical systems
cyber physical security
composability
biblio
A Secure Platform for IoT Devices based on ARM Platform Security Architecture
Submitted by grigby1 on Thu, 08/12/2021 - 4:23pm
Microprogramming
TrustZone
security service
security
Resiliency
resilience
pubcrawl
PSA
Program processors
composability
Metrics
machine-to-machine communications
IoT security
IoT
Human behavior
Hardware
Cryptography
computer architecture
biblio
Development and Implementation of a Relay Switch Based on WiFi Technology
Submitted by grigby1 on Wed, 08/11/2021 - 12:01pm
Wireless communication
iOS Security
WiFi Technology
Embedded System
Microprogramming
MQTT
Relays
Wireless fidelity
composability
Internet of Things
Hardware
Software
Resiliency
resilience
Metrics
Human Factors
pubcrawl
IoT
biblio
UEFI Trusted Computing Vulnerability Analysis Based on State Transition Graph
Submitted by aekwall on Tue, 06/01/2021 - 1:27pm
Microprogramming
UEFI
Trusted Computing
state transition graph
security
Resiliency
pubcrawl
pagerank
network theory (graphs)
Computing Theory
Human Factors
Computing Theory and Trust
Computational modeling
composability
Bayesian networks
Bayes methods
Analytical models
trust
biblio
Detecting Malware Attack on Cloud using Deep Learning Vector Quantization
Submitted by grigby1 on Thu, 05/13/2021 - 12:21pm
performance evaluation
vector quantization
UDP
spoofing
Servers
Scalability
ResNet
Resiliency
resilience
pubcrawl
Attack vectors
Microprogramming
Memcached
injected code
Human behavior
Deep Learning Vector Quantizarion
deep learning
DDoS Attack
Computer crime
Cloud Computing
biblio
Reverse Engineering and Backdooring Router Firmwares
Submitted by aekwall on Mon, 05/03/2021 - 1:10pm
cyberattack
Program processors
Resiliency
pubcrawl
Wireless fidelity
Predictive Metrics
Microprogramming
Backdoors
reverse engineering
firmware backdoor
firmware reverse engineering
wireless router hacking
Router Systems Security
biblio
An Analysis of Pre-installed Android Software
Submitted by grigby1 on Tue, 02/23/2021 - 2:24pm
resilience
potentially harmful behavior
potentially invasive private data collection practices
pre-installed Android software
pre-installed software
preinstalled apps
preinstalled software
privacy implications
product differentiation
pubcrawl
real-world Android firmware
open-source nature
Resiliency
security
sensitive data
smart phones
social network platforms
social networking (online)
Software
Supply Chain
tracking services
unwanted behavior
device manufacturers
Android devices
Android ecosystem
Android OS
Android's open source model
Androids
composability
Computer crime
crowd-sourcing methods
data privacy
data-driven services
Android (operating system)
device vendors
Ecosystems
Humanoid robots
internet
Libraries
Metrics
Microprogramming
mobile computing
mobile network operators
network accountability
biblio
Identifying Ubiquitious Third-Party Libraries in Compiled Executables Using Annotated and Translated Disassembled Code with Supervised Machine Learning
Submitted by aekwall on Mon, 02/22/2021 - 1:44pm
Databases
vector
Matrices
k-nearest neighbor search
clustering methods
Bayes method
nearest neighbor search
supervised learning
Classification algorithms
Microprogramming
Predictive Metrics
reverse engineering
Software
Measurement
neural network
supply chain management
Libraries
tools
internet
graph theory
pubcrawl
machine learning
Support vector machines
Task Analysis
biblio
An Overview of Practical Attacks on BLE Based IOT Devices and Their Security
Submitted by grigby1 on Fri, 09/04/2020 - 4:26pm
IoT devices
BLE
security vulnerabilities
BLE 4.0
BLE 4.1
BLE 4.2
BLE protocol
elliptic-curve diffie-Hellman
firmware attacks
BLE devices
LTK
MITM attacks
Mobile Applications
pairing
vulnerabilities
Wireless communication
Cyber Physical System
bluetooth security
resilience
Cryptography
Cryptographic Protocols
mobile computing
telecommunication security
public key cryptography
pubcrawl
composability
Resiliency
Internet of Things
Human behavior
cyber physical systems
firmware
Microprogramming
performance evaluation
Bluetooth
Image color analysis
1
2
next ›
last »