Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Security by Default
biblio
Secure Coding Practices in Java: Challenges and Vulnerabilities
Submitted by grigby1 on Wed, 10/30/2019 - 9:53am
Security by Default
multiple security vulnerabilities
programming
programming challenges
programming obstacles
pubcrawl
resilience
Resiliency
Scalability
Secure Coding
secure coding assistance
secure coding practices
Libraries
Spring security
SSL-TLS security
SSL/TLS
StackOverflow
StackOverflow forum
StackOverflow posts
third-party framework
third-party libraries
XML
XML-based approaches
cryptographic hash functions
security
application program interfaces
authentication
authorisation
authorization
authorization features
Certificate Validation
complex Java-based
complicated cross-language data handling
Computer crime
cross-site request forgery attacks
coding theory
Cryptography
cryptography API
CSRF
developers time
empirical study
encoding
insecure coding practices
Java
Java platform
Java secure coding
biblio
Don't Talk Unless I Say So! Securing the Internet of Things with Default-Off Networking
Submitted by grigby1 on Wed, 10/30/2019 - 9:53am
Logic gates
Web browser
smart lock
smart devices
Servers
Security by Default
Scalability
Resiliency
resilience
pubcrawl
policy language
network security
minimal access permissions
Access Control
IoT networks
IoT device communications
IoT application protocols
Internet of Things
internet
default-off networking
Computer crime
Cloud Computing
bluetooth low energy
Bluetooth
Bark phrases access control policies
authorisation
biblio
Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks
Submitted by grigby1 on Wed, 10/30/2019 - 9:53am
Secret free
industrial automation sensors
key establishment
key establishment processes
man in the middle attack
medical devices
Message Integrity Protection
multiple devices
multiple legitimate devices
ON OFF Keying
out-of-band channels
pairing process
physical layer security
physical-layer group message integrity
in-band message integrity verification
secure deployment
secure device bootstrapping
secure pairing
shared secrets
signal manipulation attacks
VERSE
wireless channel
wireless devices
wireless signal annihilation
wireless signal injection
Wireless Signal Manipulation Attack
wireless signal manipulations
Security by Default
Cryptographic Protocols
Internet of Things
security of data
resilience
wireless sensor networks
pubcrawl
Resiliency
Scalability
Protocols
Wireless communication
telecommunication security
message authentication
performance evaluation
Communication system security
authentication
authorisation
wireless channels
body area networks
public key cryptography
data integrity
autonomous vehicles
man-in-the-middle attacks
advanced wireless attacks
authenticated channels
bootstrapping protocol
extensive human involvement
Group Bootstrapping
hub
biblio
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones
Submitted by grigby1 on Wed, 10/30/2019 - 9:52am
Licenses
ZMap
unintended IPv6 connectivity
sensitive data exposure
Security by Default
security
Scalability
RNA
Revere DNS (rDNS)
Resiliency
resilience
pubcrawl
privacy
principal component analysis
network scanning
Network reconnaissance
computer network security
large-scale security scans
IPv6 hosts
IPv6 address space
IPv6
IPv4 hosts
IP networks
internet-wide scans
Internet-connected devices
Internet of Things devices
Internet of Things
internet
integrated circuits
DNSSEC-signed IPv6 reverse zones
DNSsec
DNS
biblio
Using Graph Databases to Assess the Security of Thingernets Based on the Thingabilities and Thingertivity of Things
Submitted by grigby1 on Wed, 10/30/2019 - 9:52am
pubcrawl
security of data
security flaws
Security by Default
security
secure update mechanisms
Scalability
Risk
Resiliency
resilience
cyber
NoSQL databases
IoT security standards
IoT network complexity
IoT device vendors
IoT
Internet of Things
graph databases
graph
default IoT device configurations
biblio
A Measurement Study on Linux Container Security: Attacks and Countermeasures
Submitted by grigby1 on Wed, 10/30/2019 - 9:52am
container
Kernel Security Mechanisms
privilege escalation
pubcrawl
resilience
Resiliency
Scalability
Security by Default
biblio
A System of Privacy Patterns for Informing Users: Creating a Pattern System
Submitted by grigby1 on Wed, 10/30/2019 - 9:52am
Data protection
pattern system
privacy by design
privacy design strategies
privacy patterns
pubcrawl
resilience
Resiliency
Scalability
Security by Default
biblio
CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle
Submitted by grigby1 on Wed, 10/30/2019 - 9:52am
Cryptography
Data protection by design and default
privacy by design
pubcrawl
resilience
Resiliency
Scalability
Security by Default
security by design
Software design life cycle
software engineering
biblio
DeadBolt: Securing IoT Deployments
Submitted by aekwall on Wed, 02/13/2019 - 10:59am
Security by Default
attestation
composability
Human behavior
Internet of Things
IoT
pubcrawl
Remote Attestation
Resiliency
security
biblio
Detecting Malicious PowerShell Commands Using Deep Neural Networks
Submitted by aekwall on Wed, 01/16/2019 - 1:08pm
Security by Default
composability
deep learning
malware detection
Metrics
natural language processing
Neural networks
powershell
pubcrawl
Resiliency
Windows Operating System Security
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »