Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
compatibility
biblio
Research and Development of Dual-Core Browser-Based Compatibility and Security
Submitted by grigby1 on Fri, 04/14/2023 - 3:14pm
Chromium
dual-core browser
compatibility
Behavioral sciences
Encapsulation
Browser Security
Resiliency
Multicore processing
multi-core
security
Web pages
Compositionality
Browsers
resilience
Metrics
Human behavior
pubcrawl
biblio
Research on Modeling Method of Visualized Plane Topology in Electric Power System
Submitted by aekwall on Mon, 01/20/2020 - 10:46am
platform development
visualized plane topology
user-defined power system
topology array file module
software metrics
software development
short development cycle
Resiliency
pubcrawl
primitive library module
power system visualization plane topology modeling
power system operation analysis
power system analysis computing
power system
platform interface module
algorithm module
plane topology modeling platform
Plane topology
model array file module
Microsoft Visual Studio
Microsoft Foundation Classes(MFC)
Microsoft Foundation Classes application framework
expandability
Erbium
Electric Power System
distribution network system
development method
composability
compatibility
biblio
SoK: Shining Light on Shadow Stacks
Submitted by aekwall on Mon, 12/02/2019 - 11:08am
return oriented programming
metadata
Metrics
optimization
Payloads
performance comparisons
program compilers
program diagnostics
pubcrawl
Registers
Resiliency
Memory Protection
return-oriented-programming
Scalability
security
security of data
shadow stack design
shadow stacks
shadow-stacks
Software
software security mitigations
virtual calls
control-flow-integrity
C++ languages
CFI mitigations
compatibility
compiler designers
compiler security
composability
Compositionality
control-flow hijacking attacks
control-flow integrity solutions
control-flow-hijacking
backward edge
defense mechanisms
deployed mitigations
dominant attack vector
forward edge
fully precise mechanism
Human Factors
indirect calls
language-based-security
low performance overhead