Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bars
biblio
"It builds trust with the customers" - Exploring User Perceptions of the Padlock Icon in Browser UI
Submitted by grigby1 on Tue, 12/20/2022 - 7:32pm
browser
User Perception
Usable Security
security indicators
padlock
Bars
Web Browser Security
Compositionality
Browsers
security
privacy
Conferences
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Analysis of Image Steganography Techniques for Different Image Format
Submitted by grigby1 on Fri, 04/01/2022 - 1:17pm
information management
steg analysis
Image Steganography
bit substitution
Secure File Sharing
LSB
MSB
Bars
distortion
security
Metrics
Payloads
composability
Resiliency
resilience
Human behavior
pubcrawl
biblio
Evaluation of the Detectability of Damper Cage Damages in Synchronous Motors through the Advanced Analysis of the Stray Flux
Submitted by aekwall on Tue, 08/31/2021 - 11:53am
pubcrawl
Transient analysis
synchronous motors
Steady-state
Shock absorbers
sensors
Rotors
remanent magnetism
remanence
Magnetic Remanence
Induction motors
fault diagnosis
damper cage
Bars
cyber-physical systems
Internet of Things
Compositionality
Resiliency
biblio
Design of a Smart Home System Using Bluetooth Protocol
Submitted by grigby1 on Mon, 12/28/2020 - 12:28pm
security systems
unit system
Sensor
printed circuit layout
peripheral interfaces
Peripheral interface controller microcontroller
PCB layout design
Micro-controller
main processer
home processes
fully functional smart home prototype
Diptrace software
centralized control unit
Bluetooth protocol
Bluetooth based smart home automation system
bluetooth security
Bluetooth
Home appliances
Bars
relay
mobile phones
Smart homes
microcontrollers
Switches
home automation
composability
Protocols
Resiliency
resilience
Human behavior
pubcrawl
biblio
Finding Concurrency Exploits on Smart Contracts
Submitted by grigby1 on Tue, 10/06/2020 - 2:00pm
Cryptography
smart contracts
smart contract
security of data
security attacks
security
Resiliency
resilience
pubcrawl
Metrics
general miner-side type
ethereum
cyber physical systems
application domains
CPS
contracts
Concurrent computing
concurrency exploits
concurrency exploit
Concurrency
composability
business services
business data processing
blockchain
Bars
biblio
FIXER: Flow Integrity Extensions for Embedded RISC-V
Submitted by aekwall on Mon, 02/24/2020 - 11:01am
integrated Rocket Custom Coprocessor
program compilers
security framework
RISC-V
buffer overflow
Code injection
coprocessors
fine-grained control-flow integrity
FIXER
flow integrity extensions for embedded RISC-V
return oriented programming
low-power embedded devices
open source architecture
RISC-V architecture
RISC-V processor core
RISC-V SoC platform
RISC-V toolchains
Rockets
security extension
shadow stack
Buffer overflows
Scalability
Internet of Things
data integrity
Hardware
security
embedded systems
reduced instruction set computing
system-on-chip
computer architecture
security of data
Resiliency
pubcrawl
composability
software reusability
Software Architecture
Bars
Human Factors
code reuse attacks
ROP
biblio
BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs
Submitted by aekwall on Mon, 11/18/2019 - 11:49am
privacy preservation
vehicular ad-hoc networks
vehicular ad hoc networks
VANET
Trust management
telecommunication security
security services
Scalability
revocation transparency
Resiliency
reputation system
public key infrastructure
public key cryptography
Public key
pubcrawl
privacy protection
authentication protocol
privacy
PKI Trust Models
Metrics
message authentication
internal vehicles
Human behavior
forged message broadcasting
distributed trust management
data privacy
Data models
Cryptographic Protocols
blockchain-based anonymous reputation system
blockchain
Bars
biblio
Insider Threat Cybersecurity Framework Webtool Methodology: Defending Against Complex Cyber-Physical Threats
Submitted by aekwall on Wed, 05/08/2019 - 9:46am
insider threat
vulnerability assessment
tools
Standards organizations
security of data
resilience
pubcrawl
Organizations
Metrics
insider threat self-assessment
insider threat cybersecurity posture
Insider Threat Cybersecurity Framework webtool
Bars
insider attacks
Human behavior
high-profile insider threat incidents
dynamic defense-in-depth security posture
Data visualization
cybersecurity web tool
cybersecurity methodology
cybersecurity framework
critical organizational cybersecurity questions
computer security
complex cyber-physical threats
biblio
Demonstrating Different Phishing Attacks Using Fuzzy Logic
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
Metrics
Web sites
unsolicited e-mail
Uniform resource locators
security of data
security
Resiliency
resilience
pubcrawl
phishing sites
Phishing Detection
phishing attacks
Phishing
pagerank
online banking passwords
bank account details
Membership functions
malicious website
legitimate websites
indexing
global security
Fuzzy logic
fraudulent websites
Fraudulent
Electronic mail
Defuzzification
Data mining
Computer crime
Classification algorithms
Bars
biblio
The approach to finding errors in program code based on static analysis methodology
Submitted by grigby1 on Thu, 06/07/2018 - 3:12pm
semantic information
tools
testing
syntax tree
Syntactics
syntactic information
static program code analysis
static code analysis methodology
static code analysis
source code (software)
source code
software quality
Semantics
Bars
Resiliency
resilience
pubcrawl
program diagnostics
program code Error detection
increase of efficiency
Human behavior
embedded computing
efficiency improvement
diagnostic rules
composability