Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Databases
biblio
PREEMPT: PReempting Malware by Examining Embedded Processor Traces
Submitted by grigby1 on Fri, 10/30/2020 - 12:19pm
learning (artificial intelligence)
zero overhead
tools
software-based AVS
security
Scalability
real-time systems
pubcrawl
program debugging
processor traces
PREEMPT malware
post-silicon validation
malware detection
malware
machine learning-based classifiers
low-latency technique
anti-virus software tools
invasive software
i-o systems security
I-O Systems
HPC
hardware-level observations
Hardware performance counters
Hardware
ETB
embedded trace buffer
embedded systems
embedded processor traces
debug hardware component
Databases
computer viruses
biblio
Intrusion detection for Internet of Things applying metagenome fast analysis
Submitted by grigby1 on Thu, 10/29/2020 - 11:32am
Intrusion Detection
Task Analysis
Resiliency
resilience
pubcrawl
Metrics
metagenome
manet attack prevention
malware
bioinformatics
Internet of Things
information security
genomics
DNA
de Bruijn graph
Databases
Compositionality
biblio
Evolved Similarity Techniques in Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 12:14pm
malware function similarity techniques
Zeus malware
Zeus
Semantics
reverse engineering
Resiliency
Registers
pubcrawl
privacy
Predictive Metrics
Metrics
Manuals
malware similarity
malware samples
Malware Analysis
malware function pairs
malware family
malware evolution
malware authors
malware
invasive software
Human behavior
function call graph
evolved similarity techniques
evolved code
Databases
binary similarity
graph theory
biblio
Total e-Governance: Pros Cons
Submitted by grigby1 on Fri, 10/16/2020 - 11:22am
good governance
security
Resiliency
resilience
pubcrawl
politics
political turmoil
policy-based governance
internet
information technology
government data processing
Government
Big Data
finance
ERP
economical turmoil
E-Government
E-Governance
Databases
data center
Cybersecurity
computer security
collaboration
biblio
On Learning in Collective Self-Adaptive Systems: State of Practice and a 3D Framework
Submitted by aekwall on Mon, 10/12/2020 - 11:31am
multifaceted analysis
3D framework
adaptive systems
agent-specific goals
collective self-adaptive systems
CSAS applications
Distributed Sensing
environmental data collection
learning techniques
Interconnected Systems
multiple agents
privacy-aware mechanisms
search and rescue operations
self-adaptive systems
system-wide goals
taxonomy
Expert Systems and Privacy
Scalability
learning
Autonomic systems
Systematics
Gold
distributed systems
Human Factors
integrated circuits
Decision Making
Databases
multi-agent systems
pubcrawl
Human behavior
learning (artificial intelligence)
Conferences
data privacy
biblio
Mobile Transaction Processing for a Distributed War Environment
Submitted by grigby1 on Tue, 10/06/2020 - 2:01pm
resilience
medical units
message transaction technique
Metrics
Microprocessors
military computing
mobile computing
mobile transaction processing
natural environment
optimistic concurrency control protocol
Processing time
Protocols
pubcrawl
Medical services
Resiliency
Sagas
security
serializability
Servers
Shadow paging
timely decisions
top-level commanders
transaction
transaction processing
transaction techniques
wounded soldiers
Databases
ambulance staff
battlefield environment
battlefield need
caching
Compensation Workflow
composability
computer architecture
Concurrency
concurrency control
CPS
cyber physical systems
database management systems
Actionability rules
Decision Making
distributed war environment
field hospital staff
health care
hospitals
incoming injured soldiers
irregular communications
medical authorities
medical information
medical information systems
medical service unit transactional workflow technique
biblio
Aggregated-Query-as-a-Secure-Service for RF Spectrum Database-Driven Opportunistic Wireless Communications
Submitted by aekwall on Mon, 10/05/2020 - 11:54am
aggregated-query-as-a-secure-service
Dynamic Networks and Security
unlicensed secondary users search
RF spectrum database-driven opportunistic wireless communications
RF spectrum database server
RF channel sensing uncertainties
querying RF spectrum database
location based security
licensed primary users
grid leaders
grid followers
dynamic spectrum access and security
dynamic spectrum access
database-driven dynamic spectrum access approach
telecommunication security
radio spectrum management
wireless channels
Interference
delays
Databases
Metrics
Wireless communication
composability
pubcrawl
Resiliency
Radio frequency
security
biblio
A Survey on Vulnerability Assessment Penetration Testing for Secure Communication
Submitted by aekwall on Mon, 09/28/2020 - 12:33pm
software security
Cross Site Scripting
Vulnerability Assessment and Penetration Testing (VAPT)
security patches
Security Misconfiguration
security loopholes
security hacking activities
Internet application
cyber threat
Cross-site scripting (XSS)
broken authentication
communication security
Web Application Security
vulnerability assessment
Scalability
program testing
Penetration Testing
cross-site scripting
tools
internet
Databases
Computer crime
SQL injection
pubcrawl
Human behavior
Resiliency
Organizations
biblio
Failure Disposal by Interaction of the Cross-Layer Artificial Intelligence on ONOS-Based SDON Platform
Submitted by aekwall on Mon, 09/21/2020 - 3:36pm
Artificial Intelligence
Cross Layer Security
software defined optical network
Open Network Operating System
ONOS-based SDON platform
failure disposal
cross-layer artificial intelligence
control layer
AI engines
composability
telecommunication control
software defined networking
Engines
optical fibre networks
Optical fiber networks
data layer
Databases
optimization
pubcrawl
Resiliency
feature extraction
biblio
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
Submitted by aekwall on Mon, 09/14/2020 - 12:27pm
secret challenge-response pair
identity based encryption
Intel Edison board
IoT node
IP-spoofing
key exchange protocol
Keyed hash function
password dependency
protocol resists
PUF based authentication
Digilent Nexys-4 FPGA board
secured video surveillance camera
Session Key Security
stand-alone video camera
standard network penetration tools
traditional authentication protocols
universal composability framework
verifier database
composability
physically unclonable functions
Internet of Things
Hardware
Cryptographic Protocols
Protocols
pubcrawl
Databases
authentication
message authentication
encryption
Elliptic curve cryptography
Cameras
device authentication
man-in-the-middle attack
IoT infrastructure
pufs
key management
Artix-7 FPGA
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »