Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
heuristic
biblio
Bytecode Heuristic Signatures for Detecting Malware Behavior
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
virtual machines
predictability
Security Heuristics
signature
reactive security solutions
proactive behavior heuristics
proactive approaches
malicious applications
heuristic
hash-based signatures
bytecode heuristic signatures
bytecode
behavior based detection
behavior
response time
Instruction sets
Monitoring
Computer languages
low performance overhead
Prototypes
malware behavior
computational complexity
Virtual machining
digital signatures
pubcrawl
Resiliency
invasive software
malware detection
security
malware
Scalability
biblio
Analysis of software security testing using metaheuristic search technique
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
program testing
testing
tabu search
software security testing analysis
software assurance
Software
simulated annealing
security of data
security
search problems
Search Based Testing
Search Based Engineering
Scalability
pubcrawl
composability
particle swarm optimization techniques
particle swarm optimisation
metaheuristic search technique
metaheuristic
hill climbing
heuristic search technique
heuristic
genomics
genetic algorithms
genetic algorithm
fitness function
cost effective
Conferences
biblio
Wifi authentication through social networks #x2014; A decentralized and context-aware approach
Submitted by BrandonB on Mon, 05/04/2015 - 2:48pm
telecommunication security
search time reduction
security principles
Servers
smartphone
Social Devices
Social network services
social networking (online)
social networks
search problems
Trusted Computing
ubiquitous computing
WebID
WiFi authentication
WiFi Authentication and Authorization
WiFi router
WiFi-enabled devices
wireless LAN
heuristic
authentication mechanism
authorisation
authorization
context-aware approach
decentralized approach
EAP-SocTLS
EAP-TLS
embedded trust relations
authentication
IEEE 802.11 Standards
message authentication
password
physical proximity
Probes
Protocols
quadratic search complexity
file
Cyber-Physical Systems for Resource Allocation in the Emerging Smart Electric Distribution Grid
Submitted by Sid Suryanarayanan on Mon, 02/17/2014 - 4:43pm. Contributors:
Siddharth Suryanarayanan
Timothy Hansen
Anthony Maciejewski
Edwin K. P. Chong
Howard Siegel
CPS Domains
Energy
CPS Technologies
Foundations
distributed control
electricity
end user
heuristic
social-behavioral factors
CFP Paper Submissions
CFP Submissions
2013 National Workshop on Energy Cyber-Physical Systems
2013
Academia
Position Paper
Publications