Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Modular Vulnerability Indication for the IoT in IP-Based Networks
Submitted by grigby1 on Fri, 05/15/2020 - 11:36am
Reconnaissance
modular vulnerability indication
multiple tools
Network reconnaissance
network scanner tools
Open Source Software
potential vulnerabilities
Protocols
pubcrawl
modular framework
resilience
Resiliency
Scalability
scanner module
scanning tools
security concepts
severe vulnerabilities
tools
intermediate scanning
analysis data
automated network reconnaissance
bad application
common IP-based IoT components
computer network security
Decision Making
Electronic mail
identified network vulnerabilities
advanced analysis modules
Internet of Things
Internet of Things devices
IoT devices
IP networks
IP-based networks
meaningful correlation
modular capabilities
biblio
Security Testing Of Active Optical Network Devices
Submitted by grigby1 on Fri, 05/15/2020 - 11:36am
passive exploration
tools
testing devices
testing
tested polygon
security testing
security
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Penetration Testing
Passive optical networks
active exploration
Optical network units
optical fibre networks
optical
Network reconnaissance
Network
Linux
Kali Linux
huawei
gpon
conducted testing
computer network security
analysis
active optical network devices
biblio
Machine Learning Based Novel Approach for Intrusion Detection and Prevention System: A Tool Based Verification
Submitted by aekwall on Mon, 05/11/2020 - 11:13am
authentication
unique features
proactive intrusion prevention
prevention system
power supply
multiple techniques
minimum bandwidth
limited energy
HLPSL.
AVISPA tool
AVISPA
industrial environments
WSN
intrusion prevention
formal verification
military applications
Intrusion Detection
tools
network intrusion detection
Metrics
wireless sensor networks
Wireless Sensor Network
composability
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
Protocols
Cryptographic Protocols
Servers
computer network security
biblio
Cyberthreat Detection from Twitter using Deep Neural Networks
Submitted by grigby1 on Fri, 05/08/2020 - 2:43pm
security alert
Neural Network Security
Neural networks
open source intelligence platforms
OSINT
pipeline processing
policy-based governance
pubcrawl
public domain software
recurrent neural nets
Resiliency
named entity recognition task
security information
security of data
security-related information
social media networks
social networking (online)
Task Analysis
threat detection
tools
Twitter
cyberthreat detection
bidirectional long short-term memory network
classification task
collaboration
computer security
convolutional neural nets
convolutional neural network
cyber physical systems
cybersecurity information
cybersecurity-related sources
Artificial Neural Networks
cyberthreat intelligence
deep learning
deep neural networks
event management systems
indicators of compromise
information streams
IT infrastructure
learning (artificial intelligence)
Metrics
biblio
Enhancement of Moodle learning Management System Regarding Quizzes Security and Stability Problems
Submitted by grigby1 on Fri, 05/08/2020 - 2:19pm
object oriented security
upgraded tool
tools
sudden short disconnection
stability problems
security performance
security of data
security
Resiliency
resilience
quizzes stability
quizzes security
quiz tool features
pubcrawl
online exams
composability
Moodle system environment
Moodle quiz tool
Moodle learning management system
Moodle (Modular Object Oriented Dynamic Learning Environment)
Metrics
Learning management systems
IP networks
information filtering
experimental test Moodle site
enhancement aspects
eLMS (Electronic Learning Management Systems)
Electronic learning
E-Quiz
biblio
Digital Ant Mechanism and Its Application in Network Security
Submitted by aekwall on Mon, 05/04/2020 - 11:14am
mechanisms
tools
Task Analysis
system architecture
sensors
security
Resiliency
pubcrawl
particle swarm optimization
Network Security Architecture
network security
agents
distributed self-organization cyberspace defense paradigm
digital ants system
digital ants
digital ant technology
digital ant mechanism
decision-making
Decision Making
computer network security
Communication networks
biblio
Identifying Security Spots for Data Integrity
Submitted by grigby1 on Fri, 04/24/2020 - 4:21pm
malware
tools
security spots identification
Security spot
security of data
Resiliency
resilience
pubcrawl
program diagnostics
object-oriented programs
object-oriented programming
object oriented security
Metrics
benign code
malicious code
integrity breach conditions
Integrity breach condition
insiders
insider attack
IBCs
Databases
data integrity
Couplings
coupling
composability
biblio
Experience Report: How to Extract Security Protocols' Specifications from C Libraries
Submitted by grigby1 on Fri, 04/24/2020 - 4:20pm
object-oriented languages
tools
Task Analysis
Software
security protocols
security protocol specifications
security of data
security
reverse engineering
Resiliency
resilience
pubcrawl
Protocols
object-oriented programming
automatic tools
object oriented security
Metrics
Libraries
human-dependent approach
formal verification
Formal Specification
formal model
extract security protocols
documentation
composability
codelevel reverse engineering
C programming language
C libraries
biblio
Using Safety Properties to Generate Vulnerability Patches
Submitted by aekwall on Mon, 04/20/2020 - 10:45am
relational databases
vulnerability-specific safety properties
source code patches
Software-Vulnerability
Software-Patch
safety-property
safety property
property-based APR
Program-Analysis
Buffer storage
automatic program repair methods
Automated-Program-Repair
relational database security
program debugging
Engines
Safety
program verification
program diagnostics
software maintenance
security vulnerabilities
Libraries
tools
Metrics
composability
pubcrawl
Human behavior
Resiliency
Software
security
security of data
biblio
Open-TEE is No Longer Virtual: Towards Software-Only Trusted Execution Environments Using White-Box Cryptography
Submitted by grigby1 on Fri, 04/17/2020 - 10:57am
Secure storage
WhiteBox-TEE
white-box cryptography
White Box Security
trusted execution environments
Trusted Execution Environment
tools
telecommunication security
TEE-enabled device
SPACE algorithm
Software algorithms
Software
security properties hardware TEEs
composability
Resiliency
resilience
pubcrawl
Open-TEE
open-source GlobalPlatform-compliant software TEE emulator
Mobile handsets
Metrics
Hardware
GP TEE specifications
Cryptography
Compositionality
« first
‹ previous
…
36
37
38
39
40
41
42
43
44
…
next ›
last »