Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
operating systems
biblio
OS-based Resource Accounting for Asynchronous Resource Use in Mobile Systems
Submitted by grigby1 on Tue, 09/05/2017 - 1:43pm
composability
embedded systems
Metrics
network accountability
operating systems
Power management
pubcrawl
Resiliency
resource management
biblio
M3: A Hardware/Operating-System Co-Design to Tame Heterogeneous Manycores
Submitted by grigby1 on Tue, 05/30/2017 - 12:45pm
accelerators
capabilities
composability
heterogeneous architectures
linux operating systems security
Metrics
on-chip networks
operating systems
pubcrawl
Resiliency
biblio
SCAP benchmark for Cisco router security configuration compliance
Submitted by grigby1 on Mon, 03/13/2017 - 12:23pm
OVAL
XCCDF
vulnerability measurement
security of data
security content automation protocol
security compliance
security automation
security
SCAP benchmark
policy compliance evaluation
Science of Security
operating systems
NIST
information security management
Formal Specification
Cisco router security configuration compliance
business data processing
Benchmark testing
automation
pubcrawl
biblio
Scalable Honeypot Architecture for Identifying Malicious Network Activities
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
IP networks
virtualized environment
virtualisation
Servers
server machines
server honeypots
scalable honeypot architecture
pubcrawl170114
Ports (Computers)
peripheral security measures
operating systems
malware
malicious network activities identification
Kippo
J-Honeypot
advanced persistent attacks
honeypots
HoneyD
hacker activities
government organisations
Glastopf
file servers
Distributed honeypots
Dionaea
computer network security
Computer hacking
Computer crime
computer architecture
attack packets
biblio
Securing the supply chain for commodity IT devices by automated scenario generation
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
security of data
Hardware
Homeland Security
Microprogramming
nonUS suppliers
operating systems
program analysis
program diagnostics
pubcrawl170112
security
grave vulnerabilities
software components
static program analysis
Supply Chain
supply chain management
supply chain security
supply chains
Theseus
vetting process
component interaction mapping
attack graph generation
attack graph generation algorithms
automated scenario generation
Boolean functions
Boolean satisfiability solver
checklist generation workflow
commodity devices
commodity IT devices
adversary goals
computer architecture
cyber-attacks
DARPA VET program
DP industry
firmware
firmware-software architecture
FW-SW
graph theory
biblio
Digital Forensic analysis for enhancing information security
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
Digital Forensics
pubcrawl170109
privacy
operating systems
information security enhancement
information security
image integrity
image acquisition
forensics science
forensic evidence
Analytical models
digital forensic analysis
digital forensic
digital crime scenario
data analysis
Cyberspace
Computers
antiforensic tool
antiforensic analysis
anti-digital forensic
biblio
"Dynamic Remote Attestation Based on Concerns"
Submitted by grigby1 on Thu, 02/23/2017 - 12:20pm
privacy
trusted root
Trusted Computing
tree data structures
storage applications
static measure
software metrics
Software measurement
software integrity metrics
Software Architecture
security
request service software module
Remote Attestation
pubcrawl
privacy protection
Application software
operating systems
Monitoring
Merkel hash tree
load module
integrity measurement architecture
efficiency improvement
dynamic remote attestation
dynamic credible monitoring module
Data protection
concerns
computing environments
challenger relationship analysis
attestation relationship analysis
biblio
"Detectability of low-rate HTTP server DoS attacks using spectral analysis"
Submitted by abfox on Tue, 02/14/2017 - 2:47pm
hypermedia
transport protocols
Temperature measurement
telecommunication traffic
Spectral analysis
Social network services
Servers
pubcrawl170101
operating systems
network traffic
Low-rate DoS attack
internet
Instruction sets
advanced persistent threat
HTTP server
HTTP 1.1
DoS flooding attacks
DoS attacks
denial-of-service attacks
computer network security
Computer crime
attack simulator
Attack detection
Apache HTTP Server software
Apache HTTP Server
biblio
A new type of intrusion prevention system
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
active defense intrusion detection system
Communication networks
Computer hacking
computer network security
defense
Interaction honeypot
Intrusion Detection
intrusion prevention system
Logic gates
mixed interactive honeypot
Monitoring
network security
operating systems
Servers
biblio
Some issues regarding operating system security
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
Abstracts
android
Android (operating system)
covert channel analysis
Focusing
information security
Laboratories
operating system security
operating systems
secure OS design
security of data
software engineering
Standards development
Windows
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »