Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
operating systems
biblio
Authentication and Recognition, Guarantor for on-Line Security
Submitted by grigby1 on Fri, 04/17/2020 - 11:28am
Linux
Windows Operating System Security
web services
Web Service
Web browser
SOAP
rest
Resiliency
resilience
operating systems (computers)
operating systems
Mobile handsets
mobile desktop
Metrics
iOS Security
face recognition-based authentication service
face recognition authentication service
face recognition
face biometrics
composability
biometrics (access control)
BEWARE
authorisation
ARGOS
anti-spoofing
3rd party service organizations
3D frontal facing camera
pubcrawl
biblio
Raising the Bar Really High: An MTD Approach to Protect Data in Embedded Browsers
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
MTD
browser-based vulnerabilities
computing systems security
file servers
HTML
Internet users privacy
JavaScript injection attacks
mobile
Mobile Application
mobile operating systems
mobile WebViews
moving target defense
apps
MTD approach
server-side moving target defense technique
UI component
user interfaces
Web
Web browsers safety
Web pages
WebView-Embedded app
WebViews
Web Browser Security
smart phones
security
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
privacy
internet
composability
mobile computing
security of data
online front-ends
Data protection
Cyber Attacks
Java
Metrics
Browsers
Compositionality
operating systems (computers)
operating systems
android
biblio
Analysis of the Noise Source Entropy Used in OpenSSL’s Random Number Generation Mechanism
Submitted by aekwall on Mon, 03/23/2020 - 1:20pm
operating systems
random key generation
Unix-like operating systems
TCP-IP layer
security protocol
secure socket layer
real-time clock
OpenSSL random number generation
open source library
noise source entropy
Noise
devrandom
cryptographic random numbers
cryptographic key generation
IP networks
OpenSSL
random number generation
Unix
public domain software
Entropy
Metrics
pubcrawl
Human behavior
Resiliency
transport protocols
Cryptography
Scalability
biblio
Preservation System for Scientific Experiments in High Performance Computing: Challenges and Proposed Concept
Submitted by aekwall on Mon, 03/16/2020 - 10:41am
Scientific Computing Security
scientific experiment
research experiments preservation
research experiments
research data management
preservation system
preservation process
HPC system
HPC computations
HPC
future reproduction
created experiment
containerization
computing system
case preservation
operating systems
security of data
High performance computing
Compositionality
reproducible research
Predictive Metrics
resilience
parallel processing
Containers
knowledge based systems
Libraries
internet
pubcrawl
operating system
Hardware
Servers
biblio
Scalable Translation Validation of Unverified Legacy OS Code
Submitted by aekwall on Mon, 03/16/2020 - 10:39am
scalable verification
operating systems (computers)
Predictive Metrics
program verification
pubcrawl
PVS7 theorem prover
radare2 reverse engineering tool
Resiliency
reverse engineering
Scalability
operating systems
security
Semantics
specification languages
Theorem Proving
tools
translation validation
unverified legacy OS code
XML
Formal Specification
Metrics
composability
ARM instructions
ARM machines
ARM specification language
ARMv8 ISA
cognition
Compositionality
formal reasoning
Linux Operating System Security
formal validation
formal verification
functional security properties
Google Zircon
large-scale production operating system
Linux
Linux OS
multiple high-level source languages
biblio
To Detect Malware attacks for an Autonomic Self-Heal Approach of Virtual Machines in Cloud Computing
Submitted by grigby1 on Mon, 03/09/2020 - 1:25pm
public cloud services
Virtual machining
virtual machines memory snapshots API call sequences
virtual machines
virtual machine snapshots
virtual machine security
Virtual machine monitors
unsupervised machine
unattacked virtual machine memory snapshots
supervised machine learning techniques
self-heal approach
self-heal algorithm
Self-Heal
security features
security
API calls
pubcrawl
private cloud environment
private cloud
operating systems
Monitoring
malware attacks
malware
machine learning algorithms
learning (artificial intelligence)
invasive software
Cloud Computing
attack model
application program interfaces
biblio
A Residential Client-Side Perspective on SSL Certificates
Submitted by grigby1 on Mon, 02/10/2020 - 11:31am
shorter average chain length
public key infrastructure
residential client-side
resilience
Resiliency
root certificates
Scalability
secure web connection setup
Servers
public key cryptography
SSL certificate chains
SSL certificates
SSL Trust Models
telecommunication traffic
transport protocols
untrusted root certificate
valid certificates
2M residential client machines
Public key
pubcrawl
Protocols
operating systems
Metrics
invalid certificate chains
internet
Human Factors
Human behavior
Ecosystems
computer network security
certification
certificate characteristics
Browsers
35M unique certificate chains
biblio
Detecting and Analyzing Zero-Day Attacks Using Honeypots
Submitted by aekwall on Mon, 01/20/2020 - 12:05pm
Predictive Metrics
Zero-day attacks
zero-day attack detection
zero-day attack analysis
Zero Day Attacks and Defense
Virtual machining
virtual machines
virtual machine
Snort intrusion prevention system
Snort intrusion detection system
security vulnerability
security
Resiliency
pubcrawl
Protocols
Zero day attacks
Ports (Computers)
operating systems
malware
IP networks
invasive software
intrusion detec- tion/prevention system
information security domain
honeypot system
honeypot
Dictionaries
computer network security
computer network
composability
defense
biblio
Reserch on Cyber Attack of Key Measurement and Control Equipment in Power Grid
Submitted by grigby1 on Tue, 11/19/2019 - 3:41pm
safe operation
power grids
Power measurement
power system security
power system stability
pubcrawl
resilience
Resiliency
risk analysis
risk analysis results
power grid vulnerability analysis
security of data
simulation penetration test environment
stable operation
subsequent attack test
subsequent KMCEPG-related attack penetration
terminal critical control devices
terminal key control equipment
test process
vulnerability mining
cyber security risks
Attack process construction
attack process construction technology
Attack test case
attack test cases
attack test results
composability
Computer crime
Control equipment
cyber attack
attack flow construction technology
Grid cyber attack
Grid key control equipment
Grid key measurement equipment
key measurement
Loss measurement
Metrics
operating systems
Power Grid
biblio
Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency
Submitted by grigby1 on Wed, 10/02/2019 - 2:55pm
Nessus
vulnerability assessment tools
unauthorized information disclosure
smart water system
smart home devices
smart cars
search engines
search engine
Resiliency
resilience
pubcrawl
physical components
PHP vulnerabilities
operating systems
OpenVAS
OpenSSH vulnerabilities
computational algorithms
large-scale vulnerability assessment
IoT
Internet of Things
Internet accessible CPS devices
internet
Industrial Control Systems
industrial control
ICs
Denial of Service attacks
cybersecurity posture
Cybersecurity
cyber-physical systems resiliency
cyber-physical systems
cps resiliency
computer network security
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »