Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data leaks
news
Data Leaks - What Are They?
Submitted by dgoff on Tue, 07/27/2021 - 2:37pm
Data Leaks - What Are They?
data leaks
biblio
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development
Submitted by grigby1 on Tue, 11/17/2020 - 1:41pm
OWASP
access sensitive information
Android development
data leaks
defensive requirements analysis
development lifecycle
development stage
guided security requirement analysis
Mobile Apps
mobile apps flaws
mobile software engineers
necessary security knowledge
information confidentiality
OWASP mobile top ten risks
OWASP risk analysis driven security requirements specification
secure Android mobile software development
secure mobile SDLC
secure mobile software development education
security defects open doors
security requirements
software developers
useful mobile security guidelines
Operating systems security
software engineering
security
pubcrawl
Metrics
Resiliency
data integrity
security threats
composability
mobile computing
smart phones
malware
software development management
security of data
security vulnerabilities
SDLC
risk analysis
resilience
testing
Detectors
Mobile Applications
Banking
Android (operating system)
security holes
biblio
Location Privacy and Changes in WiFi Probe Request Based Connection Protocols Usage Through Years
Submitted by aekwall on Mon, 10/26/2020 - 11:04am
mobile devices security breaches
Probes
Wireless fidelity
Compositionality
wireless networks
access protocols
data leaks
Broadcast Probe Request packets
connection protocols usage
wireless LAN
passive WiFi monitoring scans
probe request
SSID
WiFi
WiFi Access Points
WiFi Probe Request packets
Location Privacy in Wireless Networks
computer network security
tracking
mobile radio
smart phones
Metrics
privacy
Mobile handsets
location privacy
pubcrawl
Human behavior
Resiliency
Protocols
IoT devices
Internet of Things
data privacy
Monitoring
biblio
Hidden in the Shadow: The Dark Web - A Growing Risk for Military Operations?
Submitted by grigby1 on Fri, 07/10/2020 - 10:55am
marketplaces
US Navy
Tor
surface Web
sophisticated social engineering attacks
security of data
pubcrawl
PII
OWL Cybersecurity
OPSEC
operational security
open internet
military operations
military computing
anonymity
leaked data
internet
Human Factors
Human behavior
deep web
deanonymization
data sale
data leaks
data breaches
dark Web marketplaces
dark web
breached information
armed forces
biblio
Trustworthy configuration management for networked devices using distributed ledgers
Submitted by aekwall on Mon, 05/11/2020 - 10:28am
distributed execution environment
network accountability
blockchain-based distributed ledger
Building automation
Byzantine fault tolerant configuration management system
CMS
Configuration Management
configuration management process
critical configurations
data leaks
distributed ledgers
individual malicious administrators
industrial sites
IT systems
multiparty authorization
networked devices
process control
strong connection
targeted devices
trustworthy configuration management
fault tolerant computing
authorisation
authorization
Organizations
Internet of Things
IoT applications
Resiliency
pubcrawl
composability
Metrics
security of data
message authentication
security threats
Proposals
control engineering computing
fault tolerance
Traceability
physical world
Fabrics