Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
validation
biblio
Zero Trust Validation: from Practice to Theory : An empirical research project to improve Zero Trust implementations
Submitted by grigby1 on Fri, 12/02/2022 - 10:10am
resilience
zero trust
validation
Time measurement
Software measurement
Software
security strategy
risk management
Resiliency
Acoustic Fingerprints
real-time systems
pubcrawl
Organizations
Insurance
Human Factors
Human behavior
composability
Compliance
biblio
Secure Digital Signature Validated by Ambient User amp;\#x2019;s Wi-Fi-enabled devices
Submitted by grigby1 on Tue, 04/26/2022 - 1:50pm
public-key
Wi-Fi
validation
Servers
Seals
Scalability
RSSI
Resiliency
resilience
Receivers
digital signature
Public key
pubcrawl
private-key
Mobile handsets
information technology
email spoofing
Electronic mail
digital signatures
biblio
A Process to Facilitate Automated Automotive Cybersecurity Testing
Submitted by grigby1 on Tue, 01/25/2022 - 3:54pm
computer security
process
automotive
Automated Secure Software Engineering
Regulation
Regulators
verification
validation
testing
Complexity theory
security
Manuals
composability
standards
Cybersecurity
Conferences
Resiliency
resilience
pubcrawl
biblio
Addressing Verification and Validation Challenges in Future Cyber-Physical Systems
Submitted by aekwall on Mon, 06/01/2020 - 9:53am
policy-based governance
verification
validation techniques
Validation challenges
validation
V&V process
traditional verification
strategic perspective
security of data
Resiliency
resilience
pubcrawl
composability
physical parts
nontraditional middleware
nonexplainable software outputs
middleware security
middleware
H2020 ADVANCE project
future cyber-physical systems
formal verification
cyber-physical systems
computation parts
forum
Call for Papers: The 17th ACM-IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE 2019)
Submitted by willirn1 on Mon, 06/17/2019 - 11:23am
CALL FOR PAPERS
The 17th ACM-IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE 2019)
San Diego, USA | October 9-11, 2019 |
https://memocode.github.io/2019/
OVERVIEW
Calls for Papers
Architectures
Hybrid Models
Concurrency and Timing
Modeling
Resilient Systems
Validation and Verification
formal methods
modeling
critical systems
validation
verification
Announcement
biblio
Learning from Super-mutants: Searching Post-apocalyptic Software Ecosystems for Novel Semantics-preserving Transforms
Submitted by grigby1 on Tue, 01/16/2018 - 5:35pm
BIOS Security
genetic algorithm
genetic improvement
Human Factors
Metrics
pubcrawl
Resiliency
Scalability
search based software engineering
validation
biblio
SafeConfig'16: Testing and Evaluation for Active and Resilient Cyber Systems
Submitted by grigby1 on Fri, 09/15/2017 - 9:48am
Computing Theory
Control Theory
cyber
cyber experimentation
Metrics
pubcrawl
resilience
Resiliency
safeconfig
science of cybersecurity
security
Security Metrics
testbeds
testing
validation
biblio
SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems Panel Verification of Active and Resilient Systems: Practical or Utopian?
Submitted by grigby1 on Mon, 04/24/2017 - 10:48am
cyber resilience
Experimentation
pubcrawl
resilience
Resiliency
validation
verification
biblio
Using model checking for Trivial File Transfer Protocol validation
Submitted by BrandonB on Wed, 05/06/2015 - 1:44pm
Protocols
validation
UDP
trivial file transfer protocol
transport protocols
TFTP protocol
TFTP
SPIN
Software verification
software engineering
exhaustive state space search
protocol design
formal verification
Internet user datagram protocol
model based checking tool
modeling
Promela
authentication
concurrency defect detection
biblio
Constructing secure web applications with proper data validations
Submitted by BrandonB on Tue, 05/05/2015 - 9:53am
Computational modeling
computer network security
critical web application vulnerabilities
Cross Site Scripting
data validations
HTML
injection
injections
internet
secure Web applications
security
validation
Vulnerability
XML
XSS
1
2
next ›
last »