Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Powering Hands-on Cybersecurity Practices with Cloud Computing
Submitted by grigby1 on Wed, 03/18/2020 - 10:50am
Metrics
web services
virtualisation
Virtual machine monitors
tools
specific virtual computing service provider
security of data
Science of Security
Scalability
Resiliency
resilience
pubcrawl
private OpenStack cloud
powering hands-on cybersecurity practices
Policy-Governed Secure Collaboration
multiple clouds
Chameleon cloud
Human behavior
hands-on lab
hands-on cybersecurity practice
educational courses
education
cybersecurity education
computer security
computer science education
composability
Communication networks
collaboration
cloud-based platform named EZSetup
cloud-agnostic
Cloud Computing
biblio
Evaluating Scientific Workflow Engines for Data and Compute Intensive Discoveries
Submitted by aekwall on Mon, 03/16/2020 - 9:41am
Predictive Metrics
Workflow Engines
scientific workflows
Scientific Experiments
End-to-End Workflows
Data Intensive Discoveries
Converged Workloads
Scientific Computing Security
Compositionality
Software
resilience
Engines
Analytical models
tools
Computational modeling
pubcrawl
Data models
Task Analysis
biblio
Scalable Translation Validation of Unverified Legacy OS Code
Submitted by aekwall on Mon, 03/16/2020 - 9:39am
scalable verification
operating systems (computers)
Predictive Metrics
program verification
pubcrawl
PVS7 theorem prover
radare2 reverse engineering tool
Resiliency
reverse engineering
Scalability
operating systems
security
Semantics
specification languages
Theorem Proving
tools
translation validation
unverified legacy OS code
XML
Formal Specification
Metrics
composability
ARM instructions
ARM machines
ARM specification language
ARMv8 ISA
cognition
Compositionality
formal reasoning
Linux Operating System Security
formal validation
formal verification
functional security properties
Google Zircon
large-scale production operating system
Linux
Linux OS
multiple high-level source languages
biblio
A Detection and Defense Approach for Content Privacy in Named Data Network
Submitted by grigby1 on Thu, 03/12/2020 - 11:02am
named data network
tools
telecommunication network topology
telecommunication network routing
telecommunication channels
signature based defense
side-channel timing response
side-channel timing attack
Scalability
Resiliency
resilience
pubcrawl
privacy
NDN
Named Data Network Security
Attack detection
IP networks
internet
delays
data privacy
Cryptography
countermeasure methods
content privacy
consumer privacy
computer network security
Cathode ray tubes
cache storage
brute force timing attack
brute force attack model
biblio
Identifying Attack Signatures for the Internet of Things: An IP Flow Based Approach
Submitted by grigby1 on Thu, 03/12/2020 - 11:02am
Monitoring
tools
telecommunication traffic
sensitive information
security mechanisms
security
Scalability
resource limitations
Resiliency
resilience
Protocols
privacy
network intrusion detection
network attacks
signature based defense
IP networks
IP flow properties
IoT devices
IoT communications
Intrusion Detection Systems
Intrusion Detection
Internet of Things
internet
flow monitoring
defense mechanisms
computer network security
attack signature
pubcrawl
biblio
ACT Testbot and 4S Quality Metrics in XAAS Framework
Submitted by grigby1 on Mon, 03/09/2020 - 1:38pm
software prototyping
metrics reports
program debugging
program testing
pubcrawl
regression testing
security
Security Metrics
security of data
security testing
service models
Software as a service
software metrics
software product
metrics dashboard
software quality
Software Testing
T-Model
test management tools
TestBot
testing
testing as a service
Testing process
testing tools
tools
XaaS (Everything as a Service)
XAAS framework
cloud
metrics testing
4S quality metrics
ACT TestBot tool
agile environment
agile methodology
Auto Bug Logging and Tracking
automated continuous testing
Automatic testing
automation scripts
big data security metrics
bug logging
bug reporting tools
Measurement
cloud based service models
Cloud Computing
Computer bugs
Continuous Delivery
continuous deployment
Continuous Integration
continuous integration tools
Continuous Testing
data analysis
data analytics tools
Measurement and Metrics Texting
Metrics
biblio
Consistent Offline Update of Suspended Virtual Machines in Clouds
Submitted by grigby1 on Mon, 03/09/2020 - 12:26pm
security updates
cloud administrators
Cloud Computing
clouds
consistent offline update
emulation
infrastructure-as-a-service clouds
internet
OUassister
pubcrawl
security
security of data
VMs online
suspended virtual machines
suspended VMs
Task Analysis
tools
users
virtual disks
virtual machine security
virtual machines
Virtual machining
VM introspection
VMs offline
biblio
A Low-Overhead Kernel Object Monitoring Approach for Virtual Machine Introspection
Submitted by grigby1 on Mon, 03/09/2020 - 12:25pm
pubcrawl
virtualisation
virtual-machine-introspection-based security monitors
Virtual machining
virtual machines
virtual machine security
Virtual machine monitors
virtual machine introspection
tools
system monitoring
storage management
Semantics
security of data
security
Cloud Computing
page-level monitoring
page-level monitor
page-level memory monitor
out-of-virtual-machine security tools
operating system kernels
Monitoring
monitor target kernel objects
memory pages
memory page
low-overhead kernel object monitoring
kernel object modification monitoring
Kernel
dentry object monitoring
biblio
DifFuzz: Differential Fuzzing for Side-Channel Analysis
Submitted by aekwall on Mon, 03/09/2020 - 10:13am
dynamic analysis
predictability
Security Heuristics
unknown side-channel vulnerabilities
secret-dependent paths
secret program data
resource-guided heuristics
resource usage
resource consumption
Performance analysis
Java programs
fuzzing-based approach
DifFuzz
differential fuzzing
side-channel attacks
side-channel analysis
security of data
fuzzing
side-channel
Time factors
Instruments
execution time
program diagnostics
Java
Correlation
tools
vulnerability detection
pubcrawl
Resiliency
Cryptography
Scalability
biblio
Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities
Submitted by aekwall on Mon, 03/09/2020 - 10:12am
Mitch approach
web security
tools
Task Analysis
supervised learning techniques
supervised learning technique
sensitive HTTP requests
security of data
Security Heuristics
security
Scalability
Resiliency
pubcrawl
predictability
Black Box Security
Manuals
machine learning solution
machine learning approach
machine learning
learning (artificial intelligence)
internet
HTTP requests
Forgery
CSRF vulnerabilities
cross-site request forgery
Cross Site Request Forgery
Browsers
black-box detection
« first
‹ previous
…
38
39
40
41
42
43
44
45
46
…
next ›
last »