Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Foraging-Theoretic Tool Composition: An Empirical Study on Vulnerability Discovery
Submitted by grigby1 on Mon, 06/06/2022 - 11:11am
empirical study
vulnerability discovery
tools
tool design patterns
Software
security
pubcrawl
profitability
Information Reuse
Information foraging theory
object oriented security
design science
Design methodology
data science
Costs
Compositionality
codes
Metrics
composability
Resiliency
biblio
Evaluation and Enhancement of the Actionability of Publicly Available Cyber Threat Information in Digital Forensics
Submitted by grigby1 on Mon, 06/06/2022 - 11:10am
information forensics
Actionable Cyber Threat Information
Autopsy
Compositionality
Conferences
Digital Forensics
Electronic mail
Incident Investigation
Information Reuse
Object recognition
Phishing
pubcrawl
Resiliency
security
STIX
tools
biblio
Securing the metrological chain in IoT environments: an architectural framework
Submitted by grigby1 on Tue, 05/24/2022 - 12:50pm
maintenance engineering
software architectures
RMIAS
RAMI 4.0
Metrological Chain
IHE
FHIR
merging
model checking
IoMT
Compositionality
Metrics
tools
Smart Grids
Law
composability
Information Assurance
Instruments
Resiliency
resilience
Human behavior
pubcrawl
IoT
biblio
Towards an Immersive Learning Knowledge Tree - a Conceptual Framework for Mapping Knowledge and Tools in the Field
Submitted by grigby1 on Mon, 05/23/2022 - 2:57pm
immersive learning
research
Knowledge Tree
Epistemology
Soil
Terminology
knowledge based systems
immersive systems
Ontology
tools
Birds
Proposals
composability
privacy
Resiliency
Human Factors
Human behavior
pubcrawl
biblio
Towards a Threat Model and Security Analysis of Video Conferencing Systems
Submitted by grigby1 on Fri, 05/20/2022 - 2:45pm
privacy
threat mitigation
Video Conferencing
social factors
Pandemic
threat model
Metrics
real-time systems
Streaming media
tools
Analytical models
Resiliency
resilience
Human behavior
pubcrawl
cyber security
security
biblio
Tamper Resistance Functions on Internet of Things Devices
Submitted by aekwall on Thu, 05/19/2022 - 12:42pm
Metrics
Tamper resistance
Secure Boot
Key storage
flash encryption
Esp32
Internet of Things
Resistance
Technological innovation
security
Scalability
pubcrawl
encryption
tools
Human Factors
Software
Hardware
biblio
Scaling Up the IFDS Algorithm with Efficient Disk-Assisted Computing
Submitted by aekwall on Thu, 05/19/2022 - 12:39pm
Scalability
tools
optimization
pubcrawl
Metrics
composability
Random access memory
Memory management
taint analysis
IFDS
memory consumption
biblio
ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis
Submitted by aekwall on Thu, 05/19/2022 - 12:36pm
Benchmark testing
privacy
tools
Heuristic algorithms
pubcrawl
Metrics
composability
static analysis
Sensitivity
Context Sensitivity
Dynamic Supplement
Software systems
taint analysis
biblio
SecuCheck: Engineering configurable taint analysis for software developers
Submitted by aekwall on Thu, 05/19/2022 - 12:36pm
composability
Conferences
domain-specific languages
integrated development environment
Java
Metrics
pubcrawl
Runtime
security
Software
static analysis
taint analysis
tools
biblio
An Experimental Analysis on Malware Detection in Executable Files using Machine Learning
Submitted by grigby1 on Thu, 05/19/2022 - 11:59am
malware
trojan horse detection
trojan horse
Executable Files
Adware
Virus
computer viruses
spyware
Trojan horses
tools
composability
internet
Resiliency
resilience
pubcrawl
Support vector machines
machine learning algorithms
machine learning
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »