Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
operating systems
biblio
Ontology Based Security Risk Model for Power Terminal Equipment
Submitted by aekwall on Mon, 09/14/2020 - 12:32pm
Ontology
Vulnerability
security risk model
security of data
security
pubcrawl
power terminal device
power system stability
power system security
power IoT terminal device
power grids
power engineering computing
operating systems
ontology-based knowledge representation method
ontology based security risk model
APT attack
ontologies (artificial intelligence)
Ontologies
networked power terminal equipment oriented cyberspace security
network attack
Knowledge representation
IoT based technology
Internet of Things
Hardware
electric power IoT
Cryptography
computational intelligence
Compositionality
composability
APT security attack
biblio
Lightweight Virtualization Approaches for Software-Defined Systems and Cloud Computing: An Evaluation of Unikernels and Containers
Submitted by aekwall on Tue, 09/08/2020 - 10:16am
Virtual machine monitors
policy governance
clean slate
Unikernels
unikernel technologies
software-defined systems
software defined systems
software defined cloud computing
lightweight virtualization technologies
lightweight virtualization approaches
legacy unikernels
hardware infrastructure
Docker LinuxKit
Docker Containers
cloud infrastructure components
big monolithic applications
Cloud Computing
operating systems
virtual machines
operating systems (computers)
Virtualization
cloud
performance evaluation
Containers
software libraries
Metrics
pubcrawl
Human behavior
Resiliency
Kernel
virtualisation
Servers
biblio
SwitchMan: An Easy-to-Use Approach to Secure User Input and Output
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
SwitchMan
pubcrawl
resilience
Resiliency
Scalability
secure protocol
secure user input
security
Servers
Switches
Protocols
usability
usability analysis
user I-O paths
user interfaces
user protected account
user regular account
user screen output
user-level APIs
user-level malware attacks
invasive software
automatic account switching
BIOS Security
computer architecture
computer security
Human Factors
I-O Systems
i-o systems security
information sharing
Input/Output Security
application program interfaces
Keyboards
Linux
mac
malware
Metrics
operating systems
operating systems (computers)
performance evaluation
personal computers
biblio
Towards a Security Architecture for Protecting Connected Vehicles from Malware
Submitted by grigby1 on Fri, 08/28/2020 - 11:51am
Metrics
virtualisation
vehicle malware
vehicle ECUs
unexpected consequences
security architecture
security
Scalability
Resiliency
resilience
real-time operating system
pubcrawl
operating systems (computers)
operating systems
noncritical functionalities
mobile radio
attack surface
malware
life-threatening activities
invasive software
internet
infotainment system
control engineering computing
control critical vehicle functionalities
connected vehicles
connected vehicle software
computer architecture
automotive electronics
automobiles
automobile industry
attackers
biblio
Forensic Analysis of Third Party Location Applications in Android and iOS
Submitted by grigby1 on Thu, 07/30/2020 - 2:33pm
operating systems
mobile forensics
location services
application analysis
iOS Security
Mobile Security
Global Positioning System
Humanoid robots
Androids
Forensics
tools
Compositionality
Metrics
smart phones
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Evaluating Side Channel Resilience in iPhone 5c Unlock Scenarios
Submitted by grigby1 on Thu, 07/30/2020 - 2:32pm
iPhone 5c unlock scenarios
EM fault-injection
EM-based iOS studies
Fault injection
intrusion scenarios
iOS Security
iPhone
iPhone 5c model
iPhone 5c processor
electromagnetic fault-injection
locked iOS devices
locked iPhone 5c
malicious insiders
secure operating systems
side channel resilience
side channel vulnerabilities
side channel-based approach
Cryptography
application deployment
law enforcement
operating systems
operating systems (computers)
Compositionality
Metrics
Fingerprint recognition
smart phones
Hardware
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
encryption
biblio
Asynchronous Rendering of Texts in iOS Applications
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
operating systems
iOS Security
user interfaces
text information rendering
rendering (computer graphics)
rendering
iOS operating system
iOS applications
asynchronous text rendering
asynchronous methods
iOS (operating system)
mobile computing
Message systems
Instruction sets
Compositionality
Human Factors
Random access memory
Mobile Applications
text analysis
Metrics
pubcrawl
Resiliency
biblio
Evaluation of Security and Privacy of Smartphone Users
Submitted by aekwall on Mon, 07/27/2020 - 12:19pm
Metrics
spying app
smart phones
smart phone users
smart phone operating systems
smart phone
security
Resiliency
pubcrawl
privacy concerns
privacy
operating systems (computers)
operating systems
operating system
mobile computing
Operating systems security
malware
malicious apps
iOS Security
ios
Humanoid robots
Human Factors
GPS
data privacy
Compositionality
Androids
Android device
Android (operating system)
android
biblio
Investigation of Availability of Wireless Access Points based on Embedded Systems
Submitted by aekwall on Mon, 06/15/2020 - 10:58am
scientific wireless networks
available hardware
commercial networks
Economic indicators
embedded hardware platforms
external network adapter
internal wireless network adapter
load testing
Python programming language
wireless network
service.
single classification
software solution
threat
wireless access points
wireless infrastructure
wireless subscribers
Wireless communication
Servers
Internet of Things
Hardware
embedded systems
operating system
Resiliency
pubcrawl
composability
security
Metrics
internet
Vulnerability
radio access networks
Embedded System
operating systems (computers)
operating systems
biblio
A genetic algorithm for obtaining memory constrained near-perfect hashing
Submitted by grigby1 on Fri, 06/12/2020 - 12:10pm
near-perfect hashing
uniform data distribution
Statistics
Sociology
search problems
Resiliency
resilience
pubcrawl
operating systems
open-addressing double-hashing approach
nonlinear transformation
Next generation networking
binary search
memory-constrained applications
Memory management
hash table
hash algorithms
genetic algorithms
genetic algorithm
file organisation
fast items retrieval
Compositionality
Cohttps://ieeexplore.ieee.org/document/8402794mplexity theory
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »