Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
operating system
biblio
An Open Source Approach to Automating Surveillance and Compliance of Automatic Test Systems
Submitted by aekwall on Mon, 08/24/2020 - 12:42pm
automatic test systems
Security Technical Implementation Guidelines
Quasar
Pulsar
OpenScap
open source strategy
open source Elastic Stack
open source data processing pipeline
open source approach
Nebula
HubbleStack components
HubbleStack
hardware abstraction layer software
fast file integrity manger
centralized infrastructure
automating surveillance
security of data
automatic test software
cyber
operating systems (computers)
ATE
application program interfaces
Automated Response Actions
public domain software
open source
internet
composability
pubcrawl
Resiliency
operating system
system monitoring
data integrity
biblio
False Sense of Security: A Study on the Effectivity of Jailbreak Detection in Banking Apps
Submitted by grigby1 on Thu, 07/30/2020 - 2:32pm
operating system
iOS Security
Study
sensitive data protection
Mobile communication
Jailbreak Evasion
jailbreak detection
iOS App Store
banking transactions
banking app
Banking
ios
two-factor authentication
bank data processing
mobile devices
feature extraction
Trusted Computing
operating systems (computers)
Compositionality
Metrics
trusted environment
Kernel
Data protection
smart phones
mobile computing
authentication
message authentication
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Evaluation of Security and Privacy of Smartphone Users
Submitted by aekwall on Mon, 07/27/2020 - 12:19pm
Metrics
spying app
smart phones
smart phone users
smart phone operating systems
smart phone
security
Resiliency
pubcrawl
privacy concerns
privacy
operating systems (computers)
operating systems
operating system
mobile computing
Operating systems security
malware
malicious apps
iOS Security
ios
Humanoid robots
Human Factors
GPS
data privacy
Compositionality
Androids
Android device
Android (operating system)
android
biblio
Investigation of Availability of Wireless Access Points based on Embedded Systems
Submitted by aekwall on Mon, 06/15/2020 - 10:58am
scientific wireless networks
available hardware
commercial networks
Economic indicators
embedded hardware platforms
external network adapter
internal wireless network adapter
load testing
Python programming language
wireless network
service.
single classification
software solution
threat
wireless access points
wireless infrastructure
wireless subscribers
Wireless communication
Servers
Internet of Things
Hardware
embedded systems
operating system
Resiliency
pubcrawl
composability
security
Metrics
internet
Vulnerability
radio access networks
Embedded System
operating systems (computers)
operating systems
biblio
A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning
Submitted by grigby1 on Fri, 04/17/2020 - 11:28am
system monitoring
OS kernel
OS resource management
pubcrawl
Registers
resilience
Resiliency
rootkit
run-time features
security of data
OS
target kernel module
TF-IDF method
user-mode rootkit detection
Virtual machine monitors
virtual machines
virtualisation
Virtualization
windows kernel rootkits
Windows Operating System Security
kernel space
feature extraction
Hardware
hardware assisted virtualization technology
invasive software
Kernel
kernel rootkit
kernel rootkit detection approach
kernel rootkit detection solution
kernel rootkit detection system
composability
learning (artificial intelligence)
machine learning
machine learning techniques
malicious kernel module
Metrics
operating system
operating system kernels
operating systems (computers)
biblio
Side Channel Attacks in Computation Offloading Systems with GPU Virtualization
Submitted by grigby1 on Fri, 04/17/2020 - 10:23am
Runtime
Metrics
mobile computing
mobile systems
operating system
privacy
pubcrawl
resilience
Resiliency
Libraries
side channel attack
side channel attacks
side-channel attacks
virtual machine
virtual machines
virtualisation
Virtualization
virtualization privacy
graphics processing units
Cloud Computing
composability
computation offloading systems
computation performance
Cryptography
GPU systems
GPU vendors
GPU virtualization
cloud
high-performance GPUs
Human behavior
Human Factors
intensive computation
Internet of Things
IoT
Kernel
learning (artificial intelligence)
biblio
Preservation System for Scientific Experiments in High Performance Computing: Challenges and Proposed Concept
Submitted by aekwall on Mon, 03/16/2020 - 10:41am
Scientific Computing Security
scientific experiment
research experiments preservation
research experiments
research data management
preservation system
preservation process
HPC system
HPC computations
HPC
future reproduction
created experiment
containerization
computing system
case preservation
operating systems
security of data
High performance computing
Compositionality
reproducible research
Predictive Metrics
resilience
parallel processing
Containers
knowledge based systems
Libraries
internet
pubcrawl
operating system
Hardware
Servers
biblio
Toward Resilient Stream Processing on Clouds Using Moving Target Defense
Submitted by grigby1 on Tue, 02/18/2020 - 12:06pm
pubcrawl
virtual machines
virtual machine
Task Analysis
Storms
shared computing resources
sensitive streaming applications
security of data
Scalability
Runtime
resilient stream processing
Resiliency
resilience
real-time systems
real-time stream processing
Apache Storm
Payloads
operating system
MTD
moving target defense
Metrics
Fast Data platforms
Distributed databases
distributed clusters
clouds
Cloud Computing
canonical distributed stream processing platform
Big Data platforms
Big Data
biblio
Micro-Kernel OS Architecture and its Ecosystem Construction for Ubiquitous Electric Power IoT
Submitted by aekwall on Mon, 02/10/2020 - 11:58am
security
operating system kernels
POSIX standard API
power engineering computing
power systems
process based fine-grained real-time scheduling algorithm
pubcrawl
real-time OS
real-time systems
Resiliency
Scalability
scheduling
operating system
security mechanism design
security of data
service process binding
sigma0 efficient message channel
Task Analysis
Trusted Computing
Ubiquitous Computing Security
ubiquitous electric power Internet of Things
ubiquitous electric power IoT
Virtualization
Linux
Containers
ecosystem construction
embedded virtualization
functional security
Human Factors
information security
intelligent interconnection technology
intelligent NARI microkernel
Internet of Things
IoT
IoT OS
computer architecture
Linux Container
Made in China 2025
Metrics
microkernel
microkernel OS architecture
mimicry defense
multicore computing security
NARI microkernel OS
native process sandbox
network security
biblio
Process trees amp; service chains can serve us to mitigate zero day attacks better
Submitted by aekwall on Mon, 01/20/2020 - 12:04pm
sales team
buggy software
complete threat canvas
Computer graphics
data protection systems
Data Visualization techniques
exponential evolution
front-end sophistication domain
human computer interactions
network threats
process trees
attack sophistication
service chains
software professionals
software quality metrics
time 0.0 d
Unique Selling Proposition
user friendly applications
users
USP
zero day threats
Zero Day Attacks and Defense
cyber security
invasive software
operating system
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
composability
standards
tools
computer security
Software
human computer interaction
Data visualization
data visualisation
software quality
operating systems (computers)
Predictive Metrics
cyber domain
Zero day attacks
application frameworks
« first
‹ previous
1
2
3
4
5
next ›
last »