Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Information Reuse
biblio
Existing Vulnerability Information in Security Requirements Elicitation
Submitted by grigby1 on Fri, 09/01/2023 - 1:50pm
security
pubcrawl
resilience
Resiliency
Conferences
composability
Compositionality
Software systems
software engineering
requirements engineering
Software Vulnerability
Information Reuse
security requirements elicitation
biblio
A Coordination Artifact for Multi-disciplinary Reuse in Production Systems Engineering
Submitted by grigby1 on Fri, 09/01/2023 - 1:50pm
manufacturing
VDI 3695-3
reuse
Production Systems Engineering
Industry 4.0 component
Information Reuse
Robot kinematics
Production systems
Knowledge engineering
Organizations
Compositionality
composability
Computers
Resiliency
resilience
pubcrawl
security
biblio
Evaluating Software Diversity Based on Gadget Feature Analysis
Submitted by grigby1 on Fri, 09/01/2023 - 1:50pm
Software measurement
security gain
JavaScript engine
gadget feature
Information Reuse
codes
software diversity
Gain measurement
Compositionality
security
Diversity methods
code reuse attack
programming
composability
Software
Resiliency
resilience
pubcrawl
biblio
Automatic labeling of the elements of a vulnerability report CVE with NLP
Submitted by grigby1 on Fri, 09/01/2023 - 1:49pm
Compositionality
Technological
security knowledge repository
CVE
Information Reuse
BERT
Transformers
data science
distortion
named entity recognition
machine learning
natural language processing
composability
Databases
Software
Resiliency
resilience
pubcrawl
security
biblio
LSB-Reused Protection Technique in Secure SAR ADC against Power Side-Channel Attack
Submitted by grigby1 on Fri, 09/01/2023 - 1:49pm
Compositionality
synchronous
Successive approximation register analog-to-digital converter (SAR ADC)
power side-channel attack (PSA)
LSB-reused
convolution neural network (CNN)
Information Reuse
Energy Efficiency
Pins
convolutional neural networks
Internet of Things
Prediction algorithms
side-channel attacks
Registers
composability
Resiliency
resilience
pubcrawl
security
biblio
Cloud Security Analysis Based on Virtualization Technology
Submitted by grigby1 on Fri, 09/01/2023 - 1:49pm
network security
Virtualized cloud security
Information Reuse
Costs
cloud services
Trusted Computing
cloud computing security
Compositionality
Dynamic scheduling
security
composability
Computers
Hardware
Software
Resiliency
resilience
pubcrawl
biblio
TFCFI:Transparent Forward Fine-grained Control-Flow Integrity Protection
Submitted by grigby1 on Fri, 09/01/2023 - 1:48pm
composability
system security
Rockets
control-flow integrity
Information Reuse
Hardware Security
Instruction sets
Compositionality
Law
computer architecture
privacy
Hardware
Software
Resiliency
resilience
pubcrawl
security
biblio
Colored Petri Net Reusing for Service Function Chaining Validation
Submitted by grigby1 on Fri, 09/01/2023 - 1:48pm
Libraries
Configuration verification Model reuse
Colored Petri Net
Information Reuse
service function chain
service function chaining
Petri nets
Compositionality
network security
security
composability
Computational modeling
Software
Conferences
Resiliency
resilience
pubcrawl
biblio
Research on Defending Code Reuse Attack Based on Binary Rewriting
Submitted by grigby1 on Fri, 09/01/2023 - 1:48pm
Compositionality
control-flow integrity
Symbols
Information Reuse
codes
software diversity
source coding
Aerospace electronics
Semantics
security
Layout
code reuse attack
Runtime
composability
Resiliency
resilience
pubcrawl
biblio
ProcGuard: Process Injection Behaviours Detection Using Fine-grained Analysis of API Call Chain with Deep Learning
Submitted by grigby1 on Fri, 07/21/2023 - 1:15pm
policy-based governance
Writing
Scalability
Runtime
Resiliency
resilience
pubcrawl
Process Injection
privacy
Information Reuse
Measurement
malware
Heuristic algorithms
false trust
deep learning
collaboration
API call chain
security
1
2
3
next ›
last »