Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
faces
biblio
Data Wiping Tool: ByteEditor Technique
Submitted by aekwall on Wed, 04/13/2022 - 10:19am
visualization
Data Breach
tools
pubcrawl
Scalability
privacy
testing
faces
Portable computers
bring your own device
ByteEditor
Randomized data
Wiping tool
data deletion
biblio
Smart Door System with COVID-19 Risk Factor Evaluation, Contactless Data Acquisition and Sanitization
Submitted by grigby1 on Tue, 04/12/2022 - 12:17pm
Data Sanitization
UV-C sanitization
face mask
contactless temperature measurement
contactless data collection
automatic hand sanitizer
automatic door
Arduino Uno
COVID-19
Viruses (medical)
lighting
faces
Data collection
Temperature measurement
Raspberry Pi
Compositionality
composability
Protocols
privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
Methodology for Quantifying the Materiality of Audit Evidence Using Expert Assessments and Their Ranking
Submitted by grigby1 on Fri, 04/01/2022 - 1:30pm
Data mining
Security Audits
expert assessments
audit program
audit evidence
audit criteria
faces
Task Analysis
Games
tools
Scalability
Resiliency
resilience
Human behavior
pubcrawl
information security
Training
biblio
Perfect Secrecy in the Bounded Storage Model
Submitted by aekwall on Fri, 02/25/2022 - 10:43am
Cryptography
Protocols
Conferences
pubcrawl
Resiliency
Global communication
Compositionality
faces
Predictive Metrics
Secure storage
Additives
Bounded storage model
group theory
information-theoretic security
provable security
biblio
Scaling Application-Level Dynamic Taint Analysis to Enterprise-Scale Distributed Systems
Submitted by grigby1 on Mon, 11/29/2021 - 2:27pm
Complexity theory
composability
distributed systems
dynamic taint analysis
faces
Metrics
new bugs
pubcrawl
Scalability
software engineering
software tools
static analysis
taint analysis
tools
biblio
Threat Analysis of an Autonomous Vehicle Architecture
Submitted by aekwall on Mon, 11/08/2021 - 3:16pm
Autonomous Driving
threat mitigation
Security analysis
functional architecture
Electric potential
E/E architecture
cyber security
CVSS
autonomous vehicles
security
STRIDE
faces
Industries
Human behavior
Resiliency
Metrics
pubcrawl
biblio
A Trust Management System for the IoT domain
Submitted by aekwall on Wed, 08/11/2021 - 2:51pm
Trust management
authorization
pubcrawl
Scalability
Metrics
Resiliency
Human behavior
risk management
associated risk
Bayes methods
behavior
faces
Intern et-of-th ings
status
policy-based governance
Internet-scale Computing Security
biblio
An Empirical Study on Developing Secure Mobile Health Apps: The Developers' Perspective
Submitted by grigby1 on Wed, 08/11/2021 - 11:58am
Mobile Applications
wireless sensor networks
Software Engineering for Mobile
Software
security
Secure Software Development
resilience
pubcrawl
pervasive computing
mobile health
Pervasive Computing Security
Medical services
iOS Security
faces
Empirical Software Engineering
composability
Metrics
Human Factors
Scalability
Resiliency
biblio
A Biometric Key Generation Mechanism for Authentication Based on Face Image
Submitted by grigby1 on Tue, 08/03/2021 - 4:50pm
random key generation
authentication
biometric key generation
biometrics (access control)
composability
faces
feature extraction
Metrics
Microelectronics
privacy
pubcrawl
resilience
Resiliency
security
stability
Stability analysis
biblio
"Security should be there by default": Investigating how journalists perceive and respond to risks from the Internet of Things
Submitted by grigby1 on Tue, 07/27/2021 - 12:30pm
Media
smart devices
Security by Default
security
Scalability
Resiliency
resilience
pubcrawl
privacy
anticipatory threat models
Journalism
Interviews
Internet of Things
Industries
faces
Data protection
Computer crime
« first
‹ previous
1
2
3
4
next ›
last »