Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
BIOS Security
biblio
A Novel Approach of Unprivileged Keylogger Detection
Submitted by grigby1 on Fri, 09/04/2020 - 2:17pm
Keyboards
BIOS Security
userspace keylogger detection
unprivileged keylogger detection
surveillance software
spyware
privileged
operating system kernels
monitoring software
malware packages
keystroke simulation
keystroke logger
Keylogger userspace
Kernel keylogger
confidential data stealing
authorisation
microsoft windows
Human Factors
Kernel
Computers
resilience
Resiliency
Metrics
pubcrawl
mobile computing
security
invasive software
Scalability
Monitoring
biblio
SwitchMan: An Easy-to-Use Approach to Secure User Input and Output
Submitted by grigby1 on Fri, 09/04/2020 - 2:16pm
SwitchMan
pubcrawl
resilience
Resiliency
Scalability
secure protocol
secure user input
security
Servers
Switches
Protocols
usability
usability analysis
user I-O paths
user interfaces
user protected account
user regular account
user screen output
user-level APIs
user-level malware attacks
invasive software
automatic account switching
BIOS Security
computer architecture
computer security
Human Factors
I-O Systems
i-o systems security
information sharing
Input/Output Security
application program interfaces
Keyboards
Linux
mac
malware
Metrics
operating systems
operating systems (computers)
performance evaluation
personal computers
biblio
Cyber Security at a Glance
Submitted by grigby1 on Fri, 09/04/2020 - 2:16pm
Sniffing
data records
DDoS and DOS attacks
DDoS Attack
distributed denial-of-service attack
firewall
hacking techniques
man in the middle attack
polymorphic virus
proxy
computer malwares
social engineering
spoofing
Tor browser
trojan
Trojan horses
Trojans
vpn
Worm
BIOS Security
Human Factors
Computer crime
Firewalls (computing)
internet
pubcrawl
Metrics
Resiliency
resilience
cyber security
malware
Scalability
Cyber Attacks
Computer hacking
denial-of-service attack
computer viruses
antivirus
BeEF
boot sector virus
Brute forcing
biblio
Countering Malware Via Decoy Processes with Improved Resource Utilization Consistency
Submitted by grigby1 on Fri, 09/04/2020 - 2:16pm
malware
BIOS Security
resource utilization consistency
Probes
heatmap training mechanism
Heating systems
flow graphs
defensive deception
decoy processes
decoy process
control flow graphs
neural network
Human Factors
Scalability
neural nets
Neural networks
learning (artificial intelligence)
Training
resilience
Resiliency
Metrics
pubcrawl
machine learning
resource management
resource allocation
invasive software
biblio
United We Stand: A Threshold Signature Scheme for Identifying Outliers in PLCs
Submitted by grigby1 on Fri, 09/04/2020 - 2:16pm
Pulse width modulation
malware
Metrics
OpenPLC software
particular state
Pins
PLCs
predefined states
programmable controllers
Protocols
Prototypes
pubcrawl
malicious disruption
pulse width modulation pins
PWM
Raspberry Pi
Registers
resilience
Resiliency
Scalability
security
signature shares
uncorrupted PLC
group-signature
\$-threshold signature scheme
Anomaly Detection
BIOS Security
compromised state
control engineering computing
corrupted PLC
cyber security awareness week-2017 competition
digital signatures
electro-mechanical processes
finite state machine
finite state machines
(k
Human Factors
I-O Systems
i-o systems security
I/O pin configuration attack
input-output mechanism
IO pin configuration attack
l)-threshold signature scheme
Legacy PLC system
legacy PLCs
malicious code
biblio
A New Approach to Double I/O Performance for Ceph Distributed File System in Cloud Computing
Submitted by grigby1 on Fri, 09/04/2020 - 2:15pm
local file system
distribute storage systems
Engines
faster IO performance
fault tolerant computing
hard disk
Hard disks
infrastructure-as-a-service
IO operations
cloud computing system
network operating systems
persistent storage service
storage engine
storing virtual machines
virtual machine
virtual machines
Virtual machining
BIOS Security
performance evaluation
Scalability
storage management
pubcrawl
Metrics
Resiliency
resilience
optimization
Human Factors
Cloud Computing
Throughput
Distributed databases
backend block storage service
block devices
block storage resources
block storage services
Ceph distributed file system
biblio
File I/O Performance Analysis of ZFS BTRFS over iSCSI on a Storage Pool of Flash Drives
Submitted by grigby1 on Fri, 09/04/2020 - 2:15pm
Linux
BTRFS
compute-intensive systems
file I/O performance
file system
filesystem
flash drives
highly functioning storage systems
iSCSI
block device
NAS storage
open-source filesystem ZFS
storage hardware
storage pool
subvolume
ZFS
BIOS Security
Metrics
Cloud Computing
Scalability
Conferences
Bandwidth
tools
Hardware
storage management
pubcrawl
security
Resiliency
resilience
public domain software
Human Factors
performance evaluation
data management
backup storage
biblio
Composing system integrity using I/O automata
Submitted by grigby1 on Fri, 09/04/2020 - 2:15pm
closure properties
BIOS Security
vending machine
valid states
transition control
taxonomy
system integrity
invalid starts
invalid initial states
integrity definitions
input output automata
I/O automata
externally-controlled transitions
customer environment
computer viruses
security
Automatic control
automata theory
automata
system design
Safety
Human Factors
resilience
Resiliency
Metrics
pubcrawl
data integrity
Scalability
control systems
security of data
biblio
A Genetic Algorithm for Dynamic Controller Placement in Software Defined Networking
Submitted by aekwall on Mon, 04/29/2019 - 8:51am
BIOS Security
fitness evaluation
genetic algorithms
Human behavior
Metrics
moving target defense
multiple solutions/niching
Predictive Metrics
pubcrawl
Resiliency
routing and layout
Scalability
software defined networking
biblio
Evolution of Network Enumeration Strategies in Emulated Computer Networks
Submitted by aekwall on Mon, 04/29/2019 - 8:51am
Scalability
network security
Resiliency
Human behavior
pubcrawl
Metrics
genetic programming
Network Emulation
BIOS Security
1
2
3
next ›
last »