Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data flow
biblio
Intelligent System and Human-Computer Interaction for Personal Data Cyber Security in Medicaid Enterprises
Submitted by grigby1 on Fri, 09/08/2023 - 10:09am
information management
Medicaid enterprise
intelligent system
enterprise resource planning
Data Warehouse
data warehouses
intelligent data
data flow
cyber-physical system
human computer interaction
Human-computer interaction
Compositionality
security
personal data
Internet of Things
composability
cyber security
Medical services
Scalability
Hardware
Software
Resiliency
resilience
pubcrawl
biblio
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps
Submitted by grigby1 on Thu, 01/28/2021 - 1:33pm
Resiliency
mHealth apps
mobile computing
patient monitoring
personal data
privacy
Privacy Policies
Privacy Policy
privacy protection
pubcrawl
resilience
Metrics
Scalability
security
security of data
Semantics
sensitive data
severe privacy issues
severe privacy threats
software reliability
step-by-step guidelines
Systematics
Data protection
Android apps
Android mHealth
app code
app implementations
app privacy policy
app users
data collections
data flow
data practices
data privacy
android encryption
Data Transmission
GDPR
GDPR compliance violations
GDPR lists general rules
General Data Protection Regulation
GUI
Human behavior
medical computing
medical information systems
biblio
QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment
Submitted by grigby1 on Fri, 09/18/2020 - 2:15pm
pre-silicon security assessment
design stage
formal verification methods
hardware designer
hardware overhead
hardware system
hardware vulnerabilities
language based framework
language-based approach
language-based hardware security verification
malicious logic detection
potential security vulnerabilities
design mistakes
promising solution
QIF model
QIF-Verilog
quantified information flow model
quantitative information-flow
security rules
verification process
Verilog type systems
vulnerable logic detection
compiler security
integrated circuit testing
Hardware design languages
Cryptography
security solutions
security of data
security
pubcrawl
Metrics
resilience
Resiliency
Hardware
Integrated circuit modeling
hardware description languages
Scalability
Registers
integrated circuit design
formal verification
Measurement
Compositionality
uncertainty
Vulnerability Analysis
electronic engineering computing
data flow
biblio
Hybrid Approach for Detecting DDOS Attacks in Software Defined Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:42pm
SDN controller
Measurement
Metrics
network flow
normal flow
open source product
packet flow
pattern classification
precision rate
privacy
pubcrawl
malicious flow
security policies
security threats
software defined networking
Software Defined Networks
support vector machine
Support vector machines
telecommunication traffic
threat vectors
unclassified techniques
data set
ANN
Bayesian network
central point
classified techniques
Computer crime
computer network management
computer network security
control systems
data flow
and SVM
DDoS Attacks
DDOS attacks detection
destructive attack
hybrid Machine Learning techniques
KNN
learning (artificial intelligence)
machine learning
machine learning algorithms
machine learning techniques
biblio
Tracking Sensitive Information and Operations in Integrated Clinical Environment
Submitted by aekwall on Mon, 01/27/2020 - 10:28am
integrated Clinical Environment
sensitive information
complex ICE systems
data flow
data flow analysis framework
device interoperability
dynamic analysis
high-level supervisory apps
Ice
sensitive data
low-level communication middleware
medical cyber physical system
medical cyber-physical systems
medical devices
Publishing
sensitive operations
standardized framework
security
open systems
static analysis
medical information systems
middleware
interoperability
taint analysis
privacy
data flow analysis
standards
Metrics
composability
pubcrawl
performance evaluation
data privacy
security of data
biblio
Pinpointing Vulnerabilities
Submitted by grigby1 on Mon, 12/10/2018 - 11:27am
return-oriented programming
vulnerability locating
record & replay
race condition
exploit
double free
data flow
buffer overflow
Attack detection
resilience
return oriented programming
use-after-free
Human Factors
composability
Scalability
Resiliency
Human behavior
pubcrawl
biblio
Achieving ICS Resilience and Security Through Granular Data Flow Management
Submitted by grigby1 on Fri, 05/19/2017 - 2:16pm
Metrics
socio-technical systems
security
SCADA Systems Security
SCADA
risk assessment
Resiliency
resilience
pubcrawl
Compositionality
Industrial Control Systems
Human behavior
data privacy
data flow
CPS Privacy
Control Theory
Computing Theory
file
Multi-App Security Analysis: Looking for Android App Collusion
Submitted by brad_martin on Tue, 04/22/2014 - 12:23pm. Contributor:
Rogan Creswick
Presented as part of the
2014 HCSS conference
.
Abstract:
android
data flow
Galois
security
static analysis
tools
Research Organization
Presentation
HCSS'14
Mobility (HCSS'14)