Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
XML
biblio
SOAP messaging to provide quality of protection through Kerberos Authentication
Submitted by grigby1 on Fri, 03/03/2023 - 4:16pm
Phishing
kerberos security
Kerberos authentication
passwords
Retina
web security
XML
service oriented architecture
Multi-factor authentication
pubcrawl
SOAP
Protocols
web services
authentication
Resiliency
resilience
Metrics
Human behavior
biblio
Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization
Submitted by grigby1 on Fri, 01/13/2023 - 11:52am
Linux
shodan
Conpot
deception
MIMICs
Security by Default
honeypots
XML
Reconnaissance
SCADA
Servers
programming
Cybersecurity
ICs
Protocols
Scalability
network security
Resiliency
resilience
pubcrawl
biblio
Coverless Steganography Method based on the Source XML File Organization of OOXML Documents
Submitted by grigby1 on Thu, 10/20/2022 - 3:01pm
Organizations
pubcrawl
Metrics
Heuristic algorithms
privacy
composability
real-time systems
Receivers
Resistance
organization
Steganography
XML
compound tree
OOXML documents
search-based coverless steganography algorithms
steganography detection
biblio
Evaluation of Recurrent Neural Networks for Detecting Injections in API Requests
Submitted by grigby1 on Mon, 12/20/2021 - 10:29am
Gated Recurrent Units
XML
Vanilla Recurrent Neural Networks
Training
security
Resiliency
resilience
Recurrent neural networks
pubcrawl
Mobile Applications
long short term memory
API
Conferences
Computational modeling
Compositionality
composability
Bidirectional Recurrent Neural Networks
Application Programming Interface (API)
application program interfaces
Application program interface
APIs
biblio
Studying Communications Resiliency in Emergency Plans
Submitted by aekwall on Tue, 07/27/2021 - 1:11pm
Computing Theory
resilience
ABM
Analytical models
Communications
composability
Compositionality
Computational modeling
Computing Theory and Resilience
Data models
DEVS
Diffusion processes
Facsimile
network theory
pubcrawl
XML
biblio
Scalable Cloud-Based Tool to Empirically Detect Vulnerable Code Patterns in Large-Scale System
Submitted by grigby1 on Wed, 05/05/2021 - 11:41am
Buffer overflows
collaboration
Human behavior
Human Factors
Linux
Metrics
Open Source Software
policy-based governance
pubcrawl
resilience
Resiliency
Safe Coding
security
tools
XML
biblio
Malicious Qr-Code Threats and Vulnerability of Blockchain
Submitted by grigby1 on Wed, 02/10/2021 - 12:21pm
information security
XML
security
Scalability
Resiliency
resilience
QR-code attack
QR-Code
pubcrawl
Payloads
QR codes
Human behavior
Generators
fuzzing
Cyber-security
cross-site scripting
Cross Site Scripting
command injection attacks
blockchain
bitcoin
biblio
Web server security evaluation method based on multi-source data
Submitted by aekwall on Mon, 11/23/2020 - 10:23am
Compositionality
Intelligent Data and Security
Intelligent Data Security
web server security evaluation method
web security evaluation model
web security evaluation
web security assessments
single data source
multisource data
multi-source data
host security threat assessment values
evaluation indicators
data sources
XML
Safety
analytic hierarchy process
information processing
web services
internet
pubcrawl
Resiliency
Data models
security
Servers
Scalability
IP networks
security of data
biblio
Network Intrusion Detection Mechanisms Using Outlier Detection
Submitted by aekwall on Mon, 05/11/2020 - 10:13am
Intrusion Detection Subsystem
extensive network databases
Forestry
framework conduct
human blunder
information control
information mining
instrument mistake
intrusion
accessible information
network clients
network database framework
network intrusion
network intrusion detection mechanisms
network operations
network route
outlier detection
network intrusion detection
security of data
computer network security
authorisation
Conferences
Resiliency
pubcrawl
composability
Metrics
security
Databases
Vegetation
Data mining
Intrusion Detection
database management systems
XML
network information
biblio
Scalable Translation Validation of Unverified Legacy OS Code
Submitted by aekwall on Mon, 03/16/2020 - 9:39am
scalable verification
operating systems (computers)
Predictive Metrics
program verification
pubcrawl
PVS7 theorem prover
radare2 reverse engineering tool
Resiliency
reverse engineering
Scalability
operating systems
security
Semantics
specification languages
Theorem Proving
tools
translation validation
unverified legacy OS code
XML
Formal Specification
Metrics
composability
ARM instructions
ARM machines
ARM specification language
ARMv8 ISA
cognition
Compositionality
formal reasoning
Linux Operating System Security
formal validation
formal verification
functional security properties
Google Zircon
large-scale production operating system
Linux
Linux OS
multiple high-level source languages
1
2
3
next ›
last »