Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer systems
biblio
Effectiveness of Options for Designing a Pattern of Secure Access ‘Connecting Node’
Submitted by aekwall on Mon, 05/03/2021 - 1:10pm
firewall
information security
Resiliency
pubcrawl
Predictive Metrics
computer systems
means of information protection
pattern of secure access
Router Systems Security
biblio
PAIR: Pin-aligned In-DRAM ECC architecture using expandability of Reed-Solomon code
Submitted by aekwall on Mon, 03/22/2021 - 1:09pm
In-DRAM ECC
Resiliency
Reliability
Reed-Solomon codes
Reed-Solomon code
pubcrawl
process scaling
pin-aligned In-DRAM ECC architecture
performance degradation
PAIR
numerous inherent faults
In-DRAM Error Correcting Code
Compositionality
expandability
error correction codes
error correction
ECC codewords
DRAM vendors
DRAM chips
DRAM
DQ pin lines
density
computer systems
biblio
A Monitoring Framework for Side-Channel Information Leaks
Submitted by grigby1 on Mon, 03/15/2021 - 1:10pm
monitor ambient light
side-channel sources
side-channel research
side-channel information leaks
side-channel detection
sensitive information
Resiliency
resilience
recent computer security research
pubcrawl
program security requirements
private information
privacy
popular memory safety
penetration testing tools
monitoring framework
classical exploitation techniques
Metrics
memory corruption
learning (artificial intelligence)
known design patterns
injection tools
indirect means
exploitation framework
data privacy
Cryptography
computer systems
computer network security
Computer Engineering
composability
command injection attacks
biblio
Analysis of Fileless Malware and its Evasive Behavior
Submitted by grigby1 on Thu, 03/04/2021 - 2:45pm
static and advanced malware analysis
malware threats
Memory Analysis
Metrics
operating systems
Payloads
PowerShell (PS)
pubcrawl
resilience
security
malware
Task Analysis
tools
Trojan horses
white box
White Box Security
Windows Management Instrumentation (WMI)
Windows operating system
Windows Operating System Security
computer viruses
privacy
Predictive Metrics
Human behavior
Resiliency
Advance Volatile Threat
Advance Volatile Threat (AVT)
composability
computer systems
Malware Analysis
different malware
evasion
executable malware
file-based malware
fileless malware
Instruments
internet
invasive software
biblio
Digital Dynamic Chaos-Based Encryption System in a Research Project of the Department of Marine Electronics
Submitted by aekwall on Mon, 01/18/2021 - 11:22am
chaotic cryptography
signal generators
research project
digital dynamic chaos-based encryption system
digital data encryption system
Department of Marine Electronics
chaotic signal generation
computer systems
information
Trajectory
Transmitters
Scalability
chaotic communication
chaos
Mathematical model
Metrics
pubcrawl
Resiliency
encryption
Cryptography
Servers
biblio
A Malware Detection Method Based on Improved Fireworks Algorithm and Support Vector Machine
Submitted by aekwall on Mon, 12/14/2020 - 12:31pm
Levy Flights
SVM
Support vector machines
support vector machine
signature-based anti-virus systems
Resiliency
pubcrawl
Predictive Metrics
penalty factor
pattern classification
particle swarm optimization
particle swarm optimisation
optimal parameter combination
Malware detection method
malware detection
machine learning methods
threat vectors
learning (artificial intelligence)
kernel function parameter
invasive software
improved fireworks algorithm
genetic algorithms
Fireworks algorithm
Evolutionary algorithms
differential evolution
Decision trees
computer systems
composability
classification performance
privacy
Measurement
biblio
A Novel Machine Learning Based Malware Detection and Classification Framework
Submitted by aekwall on Mon, 10/26/2020 - 12:13pm
complex malware types
Predictive Metrics
computer systems
Feature Selection
dynamic analysis
feature selection algorithms
machine learning models
classification accuracy
accurate malware detection
analysis report
classification framework
malware samples
fine-grained classification
high detection
malware analysis framework
malware files
minimum computation cost
selection module
signature-based malware detection techniques
system activities
time progresses
Training
invasive software
machine learning algorithms
feature extraction
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
Metrics
pattern classification
malware
machine learning
testing
privacy
Virtual machining
Malware Analysis
cuckoo sandbox
malware classification
malware detection
static and dynamic analysis
profile
Honggang Wang
CPS Domains
CPS Technologies
computer architecture
wireless networks
Mobile Security
wireless sensor neteworks
computer systems
Massachusetts
biblio
Reasoning about Sequential Cyberattacks
Submitted by aekwall on Mon, 07/06/2020 - 10:15am
Human Factors
Cyber Dependencies
vulnerability dependencies
simulated vulnerability data
sequential cyberattacks
sequential chained attacks
NP-complete problem
fixed-point operator
cyber-attack modeling
cyber-adversary
cyber adversaries
Cost function
adversarial reasoning
computer systems
Compositionality
Scalability
cognition
Complexity theory
computational complexity
Lattices
Mathematical model
optimisation
Cybersecurity
Metrics
Computational modeling
Social network services
pubcrawl
Resiliency
invasive software
biblio
Quantum Electronic Generator of Random Numbers for Information Security in Automatic Control Systems
Submitted by aekwall on Mon, 03/16/2020 - 10:41am
Random walks
quantum computing
quantum computing security
quantum cryptography
quantum electronic generator
quantum random numbers generator
random number generation
random numbers
random numbers application
Random sequences
pubcrawl
Reliability
resilience
Resiliency
Scalability
Scientific Computing Security
semiconductor electronic components
statistical testing
tunneling
tunnelling
Cryptography
automatic control systems
communication lines
composability
Compositionality
computer systems
computer units
computing nodes
control system security
cryptographic keys
automated driving systems
electron-quantum generator
electrons tunneling
Generators
information security
neural nets
NIST
NIST statistical tests
Predictive Metrics
1
2
next ›
last »