Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
automata
biblio
Automated DNA encryption algorithm based on UNICODE and colors
Submitted by grigby1 on Tue, 01/23/2018 - 1:53pm
encoding
UNICODE encoding
Rule 51
RGB color model
Resiliency
pubcrawl
privacy
Metrics
Image color analysis
Human behavior
encryption
automata
DNA encryption algorithm
DNA cryptography based encryption algorithm
DNA cryptography
DNA cryptographic principles
DNA
Cryptography
Ciphers
cellular automata
biocomputing
biblio
Optimal Sanitization Synthesis for Web Application Vulnerability Repair
Submitted by grigby1 on Mon, 05/22/2017 - 12:58pm
automata
collaboration
Human Factors
Metrics
pubcrawl
Resiliency
safe coding standards
Sanitization Synthesis
string analysis
file
Stability of Discrete-time Switching Systems with Constrained Switching Sequences.pdf
Submitted by awhitesell on Mon, 01/23/2017 - 12:25pm
Science of Security
automata
discrete-time linear switching systems
Science of Security
Stability analysis
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
UIUC
NSA SoS Lablets Materials
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
biblio
Stability of Discrete-time Switching Systems with Constrained Switching Sequences
Submitted by awhitesell on Mon, 01/23/2017 - 12:25pm
Science of Security
automata
discrete-time linear switching systems
Science of Security
Stability analysis
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
UIUC
NSA SoS Lablets Materials
Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
biblio
Automated Test Generation from Vulnerability Signatures
Submitted by BrandonB on Tue, 05/05/2015 - 9:54am
insecure Web applications
web services
vulnerability signatures
validation and sanitization
transition
testing
string analysis
static string analysis undecidability
state
security
scripting languages
program testing
program diagnostics
path coverage
Algorithm design and analysis
HTML
digital signatures
Databases
automatic vulnerability signature computation
automated test case generation
automata-based test generation
automata-based static string analysis techniques
automata theory
automata
authoring languages
attack string discovery
Approximation methods
biblio
Monitoring Security Compliance of Critical Processes
Submitted by BrandonB on Tue, 05/05/2015 - 9:20am
predictive security analysis
security policies
security monitoring
security modeling and simulation
security information and event management
security compliance
security
Runtime
process-aware information systems
process specifications
process behavior model
process behavior analysis
automata
Predictive models
power system security
operational formal models
Monitoring
model-based support
hydroelectric power stations
hydroelectric power plant
critical processes
critical infrastructures
Computational modeling
Business
biblio
A factor-searching-based multiple string matching algorithm for intrusion detection
Submitted by BrandonB on Fri, 05/01/2015 - 7:38am
network intrusion detection systems
URL blacklist
Time complexity
synthetic rules
succinct hash table
string matching
space-efficient multiple string matching algorithm BVM
space-efficient
space complexity
Snort
security of data
SBOM
SBDM
pattern matching
AC
multiple string matching
matching speed
Intrusion Detection
huge memory usage
factor-searching-based multiple string matching algorithm
factor searching-based algorithms
ClamAV
bit-vector
automata-based multiple string matching algorithms
automata theory
automata
arrays
biblio
A factor-searching-based multiple string matching algorithm for intrusion detection
Submitted by BrandonB on Thu, 04/30/2015 - 11:49am
network intrusion detection systems
URL blacklist
Time complexity
synthetic rules
succinct hash table
string matching
space-efficient multiple string matching algorithm BVM
space-efficient
space complexity
Snort
security of data
SBOM
SBDM
pattern matching
AC
multiple string matching
matching speed
Intrusion Detection
huge memory usage
factor-searching-based multiple string matching algorithm
factor searching-based algorithms
ClamAV
bit-vector
automata-based multiple string matching algorithms
automata theory
automata
arrays
file
Model-based System-Level Testing for Distributed Transportation CPS
Submitted by ratneshsudha on Thu, 02/20/2014 - 11:06am. Contributor:
Ratnesh Kumar
CPS Domains
Automotive
Communication
Testing
Systems Engineering
Transportation
Validation and Verification
CPS Technologies
Foundations
automata
computing
Software
CFP Submissions
CFP Paper Submissions
2014 National Workshop on Transportation CPS
2014
Academia
Position Paper
Publications
« first
‹ previous
1
2
3
4
5