Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Security weakness
biblio
Security Vulnerabilities in Handover Authentication Mechanism of 5G Network
Submitted by aekwall on Mon, 11/16/2020 - 1:50pm
Resilient Security Architectures
IoT-based applications
key hierarchy
key resilience problem
message authentication
mobility management (mobile radio)
pre-authentication
pubcrawl
Resiliency
Internet of Things
secret keys
security counter-measures
security demands
security issues
security vulnerabilities
Security weakness
telecommunication security
Third Generation Partnership Project
communication entities
5G communication network
5G handover
5G handover key mechanism
5G handover security analysis
5G mobile communication
5g network
authentication
authentication complexity
3GPP
computer architecture
Fifth Generation mobile telecommunication technology
Handover
handover architecture
handover key mechanism
handover mechanism
inter-gNB handover
inter-gNB handover authentication mechanism
biblio
Exposing the Security Weaknesses of Fifth Generation Handover Communication
Submitted by grigby1 on Mon, 02/17/2020 - 4:07pm
5G handover
handover key mechanism
Human behavior
inter-gNB handover
key hierarchy
Metrics
policy-based governance
pubcrawl
resilience
Resiliency
Security weakness
security weaknesses
biblio
The Seven Sins: Security Smells in Infrastructure as Code Scripts
Submitted by grigby1 on Mon, 02/10/2020 - 10:35am
resilience
tools
static code analysis
static analysis
Software
smell
Servers
Security weakness
security smells
security of data
security linter tool
security linter for infrastructure as code scripts
security breaches
security
Resiliency
composability
puppet
pubcrawl
program diagnostics
program debugging
password
infrastructure as code
IaC scripts
Human behavior
hard-coded secret
hard-coded passwords
encoding
empirical study
devsecops
DevOps
biblio
Assessment of Hypervisor Vulnerabilities
Submitted by grigby1 on Mon, 11/20/2017 - 11:22am
testing
policy-based governance
Ports (Computers)
pubcrawl
Resiliency
security
security of data
Security weakness
security weaknesses
Software
Policy
virtual machine management
Virtual machine monitors
virtual machines
Virtual machining
virtualisation
Virtualization
VMware ESXi
Vulnerability Analysis and Assessment
Governance
Cloud Computing
cloud computing systems
collaboration
CVE
CVSS
CVSS information
CWE
ESXi Web interface
Citrix XenServer
Government
HTTP response splitting
Human behavior
hypervisor security
hypervisor vulnerability assessment
KVM
Metrics
NIST 800-115 security testing framework
biblio
Cultural and Psychological Factors in Cyber-security
Submitted by grigby1 on Mon, 11/20/2017 - 11:22am
collaboration
culture
Cyber-security
Governance
Government
Human behavior
Human Factors
Metrics
personality traits
Policy
policy-based governance
privacy
pubcrawl
Resiliency
Security weakness
security weaknesses
biblio
Improving Vulnerability Detection Measurement: [Test Suites and Software Security Assurance]
Submitted by grigby1 on Mon, 11/20/2017 - 11:22am
pubcrawl
weakness
Vulnerability
test suites
static analysis
security weaknesses
Security weakness
Security Metrics
Resiliency
collaboration
policy-based governance
Policy
Metrics
Human behavior
Government
Governance
dynamic analysis
biblio
An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol
Submitted by grigby1 on Mon, 11/20/2017 - 11:22am
Performance
session initiation protocol
security weaknesses
Security weakness
security
Resiliency
pubcrawl
policy-based governance
Policy
authentication
Metrics
key-agreement
Human behavior
Government
Governance
Elliptic curve cryptography
collaboration
biblio
Cryptanalysis and Improvement of a Certificateless Short Signature Scheme Using Bilinear Pairing
Submitted by grigby1 on Mon, 11/20/2017 - 11:22am
Certificate-less short signature (CLSS) scheme
collaboration
Governance
Government
Human behavior
Metrics
Pairing based cryptography
Policy
policy-based governance
pubcrawl
Random oracle
Resiliency
Security weakness
security weaknesses
biblio
A classification methodology for security patterns to help fix software weaknesses
Submitted by grigby1 on Mon, 11/20/2017 - 11:22am
Policy
web applications
software weakness fixing
software weakness
software life
Software
security weaknesses
Security weakness
security principles hierarchical organization
security principles
security patterns
security of data
Resiliency
pubcrawl
policy-based governance
authentication
pattern classification
pattern choice
Metrics
internet
Human behavior
Government
Governance
Fault tolerant systems
fault tolerance
Databases
collaboration
classification semiautomatic methodology
classification
authorization