Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Policy-Governed systems
biblio
Dragon Architect: Open Design Problems for Guided Learning in a Creative Computational Thinking Sandbox Game
Submitted by grigby1 on Wed, 05/09/2018 - 2:54pm
collaboration
composability
computational thinking
game-based learning
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
programming education
pubcrawl
sandboxing
biblio
Sandcrust: Automatic Sandboxing of Unsafe Components in Rust
Submitted by grigby1 on Wed, 05/09/2018 - 2:54pm
collaboration
composability
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
pubcrawl
sandboxing
biblio
Session Based Behavioral Clustering in Open World Sandbox Game TUG
Submitted by grigby1 on Wed, 05/09/2018 - 2:54pm
clustering
collaboration
composability
Data mining
open world sandbox games
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
pubcrawl
sandboxing
user behavioral clustering
biblio
IoT Sandbox: To Analysis IoT Malware Zollard
Submitted by grigby1 on Wed, 05/09/2018 - 2:54pm
collaboration
composability
IoT
malware
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
pubcrawl
sandbox
sandboxing
biblio
Synthesis of Hardware Sandboxes for Trojan Mitigation in Systems on Chip
Submitted by grigby1 on Wed, 05/09/2018 - 2:54pm
security
nontrusted IP
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
property specification language SERE
pubcrawl
run-time verification techniques
sandboxed layouts
sandboxing
IP security
sequential extended regular expressions
SoC
system-on-chip
Trojan horses
Trojan mitigation
trusted system-on-chips
virtualized controllers
virtualized resources
composability
automata theory
automatic generation
behavioral checkers
behavioral properties
CAPSL
collaboration
component authentication process
components off the shelf
automata
computer science
Computers
COTS
design flow
Hardware
hardware sandboxes
interface automata
invasive software
biblio
Identifying Email Threats Using Predictive Analysis
Submitted by grigby1 on Wed, 05/09/2018 - 2:54pm
Policy
URL
unsolicited e-mail
unseen emails
Uniform resource locators
targeted attacks
Support vector machines
static analysis
sandboxing
Random Forest
pubcrawl
Predictive models
predictive analysis approach
Policy-Governed systems
Policy-Governed Secure Collaboration
Analytical models
malware attachment
malware
malicious emails
machine learning model
machine learning algorithms
learning (artificial intelligence)
invasive software
feature extraction
email threat identification
Electronic mail
Computer crime
composability
collaboration
attackers
biblio
Towards Proactive SDN-Controller Attack and Failure Resilience
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
resilience
moving-target defense
network performance
PAFR
plug-and-play operation
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
proactive SDN-controller attack
pubcrawl
live remote checkpointing
sandboxing
SDN networks
security
Servers
software defined modules
software defined networking
Software-Defined Networks
Virtualization
controller/host isolation
checkpointing
collaboration
composability
computer network performance evaluation
computer network security
Containers
control systems
controller resilience
controller sandboxing mechanism
central SDN controller
data center networks
failure resilience
failure-and-attack-resilient execution
generic hardware platforms
host-based attacks
Linux
Linux containers
Linux-containers
biblio
Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
Malware Analysis
Snort
Signature-based detection
Servers
sandboxing environment
sandboxing
pubcrawl
Ports (Computers)
Policy-Governed systems
Policy-Governed Secure Collaboration
Policy
openstack
NIDS module
network intrusion detection systems
network intrusion detection system
Cloud Computing
malware
malicious attacks
invasive software
Intrusion Detection
honeypot networks
Honeypot Network
Dynamic Malware Analysis
cost services
computer architecture
composability
collaboration
cloud-computing technology
Cloud Security
cloud environment
biblio
RansHunt: A Support Vector Machines Based Ransomware Analysis Framework with Integrated Feature Set
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
ransomware families
malwares
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
pubcrawl
RansHunt
Ransomware
ransomware analysis framework
malware
ransomware samples
ransomware variants
sandboxing
static analysis
static code features
static features
Support vector machines
Algorithm design and analysis
machine learning
learning (artificial intelligence)
invasive software
integrated feature set
individual analysis approach
hybrid cryptosystem
Heuristic algorithms
feature extraction
Electronic mail
dynamic analysis
cyber-crime
Cryptography
crypto-ransomwares
composability
collaboration
biblio
Fine-Grained Supervision and Restriction of Biomedical Applications in Linux Containers
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
program libraries
medical administrative data processing
medical data processing
Monitoring
multidimensional biosignal recordings normalization
operating system
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
Process Supervision
Linux containers
pubcrawl
sandbox
sandboxing
security
security of data
security technologies
system call filtering
System Call Interception
Containers
application analysis
biomedical application restriction
biomedical data
Cloud Computing
collaboration
complex programs
composability
container portability
algorithm development
data analysis
distributed processing
docker-based container
external code repositories
fine-grained restricted environment
fine-grained supervision
Kernel
Linux