Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Traffic Normalization for Covert Channel Protecting
Submitted by grigby1 on Tue, 04/19/2022 - 2:13pm
information security
tools
timing
telecommunication traffic
security
Scalability
Resiliency
resilience
residual covert channel capacity
pubcrawl
normalization
channel capacity
Information Leakage
estimation
Data protection
covert channels
covert channel
countermeasure
Compositionality
composability
Channel estimation
biblio
Performance Comparison on SQL Injection and XSS Detection using Open Source Vulnerability Scanners
Submitted by aekwall on Tue, 04/19/2022 - 10:27am
pubcrawl
vulnerability scanner
Vulnerability
tools
Time factors
SQL injection
security
Scalability
Resiliency
vulnerability detection
Open Source Software
data science
cross-site scripting
Cross Site Scripting (XSS)
Cross Site Scripting
Compositionality
Metrics
Human behavior
biblio
Mining String Feature for Malicious Binary Detection Based on Normalized CNN
Submitted by aekwall on Tue, 04/19/2022 - 10:19am
Communication Systems
deep learning
tools
feature extraction
machine learning
Conferences
Learning systems
Resiliency
composability
malware
malware detection
pubcrawl
normalized CNN
string feature
Cross Layer Security
biblio
A Functional Approach to Cyber Risk Assessment
Submitted by grigby1 on Mon, 04/18/2022 - 9:57am
Complexity theory
cyber risk assessment
estimation
Human Factors
information security
logistic function
Logistics
Metrics
Organizations
pubcrawl
quantitative methods
resilience
risk management
Scalability
Security Risk Estimation
tools
biblio
Verification of Cloud Security Policies
Submitted by grigby1 on Mon, 04/18/2022 - 9:53am
Security Policies Analysis
Access Control
authorization
Companies
metagraphs
policy modeling
policy verification
policy-based governance
process control
pubcrawl
Redundancy
rego
Scalability
security policies
Switches
tools
biblio
Classification Based Machine Learning for Detection of DDoS attack in Cloud Computing
Submitted by grigby1 on Wed, 04/13/2022 - 9:33am
tools
Cloud Computing
feature extraction
Servers
pubcrawl
Human behavior
resilience
Resiliency
Metrics
Reinforcement learning
denial-of-service attack
DDoS attack detection
supervised learning
biblio
Where is our data? A Blockchain-based Information Chain of Custody Model for Privacy Improvement
Submitted by aekwall on Wed, 04/13/2022 - 9:20am
blockchain
chain of custody
data deletion
Data models
data privacy
health data
information management
Insurance
privacy
Prototypes
pubcrawl
Scalability
sensitive data
tools
Traceability
Urban areas
biblio
Data Wiping Tool: ByteEditor Technique
Submitted by aekwall on Wed, 04/13/2022 - 9:19am
visualization
Data Breach
tools
pubcrawl
Scalability
privacy
testing
faces
Portable computers
bring your own device
ByteEditor
Randomized data
Wiping tool
data deletion
biblio
Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices
Submitted by grigby1 on Tue, 04/12/2022 - 11:20am
Limiting
tools
Static-Analysis
security
Resiliency
resilience
pubcrawl
privacy
Mobile Applications
composability
IoT
Human behavior
fuzzing
firmware-analysis
dynamic-analysis
Data Sanitization
Computer bugs
Compositionality
biblio
Metrics-based Knowledge Analysis in Software Design for Web-based Application Security Protection
Submitted by grigby1 on Fri, 04/01/2022 - 1:48pm
tools
pubcrawl
Software
Metrics
software metrics
software security
Knowledge engineering
Media
Security Metrics
Communications technology
software design
Digital art
knowledge analysis
secure implementation
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »