Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Explosions
biblio
CAN-FT: A Fuzz Testing Method for Automotive Controller Area Network Bus
Submitted by aekwall on Fri, 08/26/2022 - 11:56am
security
automobiles
pubcrawl
Resiliency
Internet of Things
generative adversarial networks
fuzzing
controller area network security
cyber-physical systems
boosting
information science
Fuzz Testing
AdaBoost
CAN bus
Explosions
biblio
An Improved Byzantine Consensus Based Multi-Signature Algorithm
Submitted by grigby1 on Mon, 04/18/2022 - 11:37am
blockchain
component
Computational modeling
Consensus algorithm
consensus mechanism
cyber attack
Data Security
Explosions
formatting
Memory
pubcrawl
Scalability
security scalability
Smart Grid
telecommunication traffic
biblio
Software Safety Verification Framework based on Predicate Abstraction
Submitted by grigby1 on Tue, 03/15/2022 - 12:12pm
Software verification
scalable verification
predicate abstraction
Explosions
CEGAR
software safety
Compositionality
model checking
Metrics
tools
Computational modeling
Scalability
Safety
Conferences
Resiliency
resilience
pubcrawl
biblio
Compositional Taint Analysis of Native Codes for Security Vetting of Android Applications
Submitted by grigby1 on Mon, 11/29/2021 - 2:27pm
Binary Analysis
composability
dynamic programming
Explosions
Function Summaries
Metrics
Mobile Security
operating systems
Performance analysis
privacy
pubcrawl
static analysis
Symbolic Execution
taint analysis
tools
biblio
Anomaly Detection in Surveillance Videos
Submitted by aekwall on Mon, 04/13/2020 - 10:28am
long short-term memory networks
Videos
anomalous behavior
anomaly classification
CNN-LSTM model
explosion
Explosions
Frames
learning patterns
video surveillance
public safety
road accidents
spatial feature extraction
spatial feature learning
surveillance videos
temporal feature learning
UCF Crime dataset
convolutional neural nets
feature extraction
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Metrics
LSTM networks
Training
security of data
Anomaly Detection
convolutional neural networks
image classification
video signal processing
recurrent neural nets
classification
surveillance
biblio
Efficient and Safe Control Flow Recovery Using a Restricted Intermediate Language
Submitted by grigby1 on Thu, 09/26/2019 - 10:24am
security
program diagnostics
program verification
pubcrawl
resilience
Resiliency
restricted control transition intermediate language
Safe Coding
safe control flow recovery
program compilers
security mechanisms
security of data
security policies
Security Validation
Semantics
software fault tolerance
source code level
Explosions
Bianry Analysis
collaboration
Computational modeling
Conferences
Control Flow Recovery
control-flow recovery
data flow analysis
data-flow analyses
automatic analysis
Formal Specification
Human behavior
Human Factors
low-level object code
Memory management
Metrics
policy-based governance
biblio
S2F: Discover Hard-to-Reach Vulnerabilities by Semi-Symbolic Fuzz Testing
Submitted by K_Hooper on Wed, 04/04/2018 - 9:58am
program testing
vulnerability detection tools
vulnerability detection
tools
test case generation
Symbolic Execution
Software Vulnerability
software tools
semisymbolic fuzz testing
Resiliency
pubcrawl
Prototypes
Binary Analysis
path explosion
Metrics
low frequency input
Human behavior
hard-to-reach vulnerabilities
fuzzy set theory
Fuzz Testing
fuzzing
Explosions
Computer bugs
Compositionality
biblio
Learning composable models of parameterized skills
Submitted by K_Hooper on Wed, 02/28/2018 - 11:31am
learning (artificial intelligence)
uncertainty
Training
robots
robot skills
robot programming
pubcrawl
Planning
parameterized skills
learning models
composable models
Intelligent systems
intelligent system
intelligent robots
Generators
generative planning and execution system
Explosions
control engineering computing
Compositionality
biblio
A security Policy Query Engine for fully automated resolution of anomalies in firewall configurations
Submitted by grigby1 on Mon, 11/20/2017 - 12:25pm
Firewalls (computing)
Shadow mapping
security policy query engine
security policies
radically disjunctive approach
query processing
pubcrawl
policy-based governance
Policy
Government
Governance
FPQE
anomaly resolution
firewalls
firewall rules
firewall configuration
firewall anomalies
Explosions
Engines
Electronic mail
Correlation
correction process
collaboration