Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
user interfaces
biblio
Raising the Bar Really High: An MTD Approach to Protect Data in Embedded Browsers
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
MTD
browser-based vulnerabilities
computing systems security
file servers
HTML
Internet users privacy
JavaScript injection attacks
mobile
Mobile Application
mobile operating systems
mobile WebViews
moving target defense
apps
MTD approach
server-side moving target defense technique
UI component
user interfaces
Web
Web browsers safety
Web pages
WebView-Embedded app
WebViews
Web Browser Security
smart phones
security
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
privacy
internet
composability
mobile computing
security of data
online front-ends
Data protection
Cyber Attacks
Java
Metrics
Browsers
Compositionality
operating systems (computers)
operating systems
android
biblio
Learning to Identify Security-Related Issues Using Convolutional Neural Networks
Submitted by aekwall on Mon, 02/10/2020 - 12:10pm
open source issues
Semantics
user interfaces
agile development practices
aid development teams
CNN
high dimensional word embeddings
issue descriptions
Man-machine systems
natural language descriptions
security issues
robust security assurance
SDL
security-focused automation
security-related content
security-related requirements
software products
two-phase neural net architecture
vulnerability descriptions
software assurance
convolutional neural network
security
Kernel
computer architecture
learning (artificial intelligence)
pubcrawl
composability
deep learning
Databases
convolutional neural nets
security of data
Companies
ontologies (artificial intelligence)
Data mining
public domain software
software security
Scalability
software quality
Human Factors
biblio
Protecting Privacy with a Declarative Policy Framework
Submitted by aekwall on Mon, 11/11/2019 - 11:47am
privacy policy framework
formal verification
Human behavior
Ontologies
policy decision point
privacy
privacy enhancing technologies
Privacy Policies
privacy policy creation
privacy policy decision engine
privacy policy engine decisions
Formal Specification
privacy policy management
privacy policy validation
privacy protection
pubcrawl
Scalability
security of data
Semantics
technical details
user interfaces
Common Data Model
Resiliency
-Automated-reasoning
-Data-sharing
-Ontology
-Policy
-Policy-Decision-Engine
-Privacy-Framework
-Reasoning
-Rule
-Semantic-Technology
Computing Theory and Privacy
Cryptography
Data models
data privacy
Databases
declarative policy framework
Engines
enterprise privacy prototype system
expressive policy specification
formal shareability theory
biblio
Fuzzy Logic Aided Intelligent Threat Detection in Cisco Adaptive Security Appliance 5500 Series Firewalls
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
statistical information
organisational security
prioritised security events
pubcrawl
resilience
Resiliency
security
security status
significant information
software version
organisational networks
third-party tool
threat detection function
threat detection process
threat detection statistics
tools
traffic patterns
user interfaces
valuable features
Firewalls (computing)
analysing packet drop statistics
Cisco adaptive security appliance 5500 series firewall
complete basic threat detection
comprehensible solution
Computer crime
customised feature based threat detection
feature extraction
firewalls
advanced threat detection
Fuzzy logic
fuzzy reasoning
fuzzy reasoning system
intelligent threat detection solution
Metrics
Monitoring
network traffic
organisational aspects
biblio
Spring Boot Based REST API to Improve Data Quality Report Generation for Big Scientific Data: ARM Data Center Example
Submitted by grigby1 on Fri, 03/22/2019 - 12:59pm
service-oriented architecture
production-grade Spring applications
pubcrawl
public domain software
resilience
Resiliency
rest
REST service API
Scalability
Servers
popular Spring Boot java-based framework
spring boot
spring boot application
spring configuration
spring model-view-controller framework
Springs
tools
user interfaces
web application technologies
data integrity
application server
arm data center example
atmospheric radiation measurement data center
auto configuration
Big Data
big data security
computer centres
CRUD
CRUD web applications
application program interfaces
data quality report generation
Databases
enterprise applications
internet
Java
java framework
Metrics
natural sciences computing
biblio
Control systems and the internet of things \#x2014; Shrinking the factory
Submitted by grigby1 on Wed, 07/18/2018 - 10:15am
pubcrawl
Logic gates
Monitoring
network capable computer
passive infrared detectors
powerful ARM processor
Production facilities
programmable I-O interface
programming interfaces
Lips
Radio network
Raspberry Pi
Scalability
sensor network
sensors
smart interconnected society
user interfaces
wireless LAN
feedback mechanisms
component
control loop
control systems
control-monitoring systems
domestic Internet solution
factory automation
factory control systems
Factory System
battery life
I-O Systems
i-o systems security
industrial control
infrared detectors
Interfaces
internet
Internet of Things
IoT
biblio
Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational Invariants
Submitted by grigby1 on Mon, 06/11/2018 - 3:37pm
SD-card storage manager
Named Data Network Security
open-source designs
pattern classification
program debugging
program verification
pubcrawl
Registers
resilience
Resiliency
robotics controller
Scalability
Local area networks
security
security of data
sequential logic
SIMAREL
specification languages
storage management
STREAMS policies
unbounded input streams
user interfaces
Wires
Ethernet controller
automatically-synthesized relational invariants
circuit executions
core design C
debugging interface
declassification
digital signal processing chips
digital-signal processing module
Domain-Specific Language
DSP module
dynamic conditions
Algorithm design and analysis
field programmable gate arrays
flash memories
flash memory controller
flow security
Hardware
Hardware design languages
Human behavior
human computer interaction
information leaks
information-flow policies
biblio
Testing Techniques and Analysis of SQL Injection Attacks
Submitted by grigby1 on Thu, 05/24/2018 - 12:08pm
SQL Injection vulnerability
resilience
Resiliency
security of data
security systems
security testing
sensitive data
sensitive information
SQL
SQL injection
SQL Injection attacks
SQL injection problems
relational databases
SQL query
testing techniques
three-tier-architecture
traditional security policies
user interfaces
users
Web application vulnerabilities
web applications
Web sites
website
handy interface
attackers
Cogeneration
commonly used Web application attacks
composability
Data protection
database-driven Web applications
DH-HEMTs
different security systems
effective data protection systems
good target
governmental organizations
attack
Human behavior
integrated circuits
internet
Knowledge engineering
Metrics
penetration testing technique
program testing
proper data protection
pubcrawl
relational database security
biblio
IoT network monitor
Submitted by K_Hooper on Wed, 05/09/2018 - 11:00am
router
Mirai Botnet
Monitoring
network data analysis
password
Ports (Computers)
privacy
pubcrawl
Raspberry Pi
Resiliency
IoT network monitor
Scalability
security
Security by Default
security vulnerability
sensitive personal information
telecommunication traffic
user-friendly interface
user interfaces
deep packet analysis
Anomaly Detection
Biomedical monitoring
botnet
botnet traffic detection
character strings
computer network security
connected devices
consumer home IoT networks
Android (operating system)
default device passwords
default passwords
Entropy
home networks
home network security
Internet of Things
invasive software
IoT device
biblio
High-Level Online User Attribution Model Based on Human Polychronic-Monochronic Tendency
Submitted by grigby1 on Mon, 03/05/2018 - 1:03pm
logistic model tree
user interfaces
user identification process
user attribution model
UML behavioral modeling style
Training
temporal model
social network profiling process
Servers
Sea measurements
Scalability
pubcrawl
Polyphasia tendency
policy-based governance
online user attribution process
online profiling process
1-to-N User identification
internet
human preference
human polyphasia tendency
human polychronic-monochronic tendency
human inherent dynamics
Human Factors
Human behavior
forensic identification and profiling process
feature extraction
e-learning profiling process
computer science
collaboration
biometrics (access control)
Behavioral biometrics
attribute-based encryption
« first
‹ previous
1
2
3
4
5
6
next ›
last »