Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
vulnerabilities
biblio
DynaMalDroid: Dynamic Analysis-Based Detection Framework for Android Malware Using Machine Learning Techniques
Submitted by grigby1 on Wed, 09/20/2023 - 9:51am
operating systems
vulnerabilities
Technological innovation
system calls
Support vector machines
Resiliency
resilience
pubcrawl
privacy
Android malware
Metrics
Malware Analysis
malware
Knowledge engineering
Human behavior
feature extraction
dynamic analysis
deep learning
biblio
Discovering the Need for Information Assurance to Assure the End Users: Methodologies and Best Practices
Submitted by grigby1 on Fri, 02/17/2023 - 4:40pm
Safety
vulnerabilities
Virtual private networks
threats
supply chains
Standards organizations
software reliability
software assurance
Software
security
Scalability
Information Assurance
Resiliency
resilience
pubcrawl
privacy
Operating-Systems
legislation
integrity
Information-Assurance
Hack
attack
biblio
Security of operating system using the Metasploit framework by creating a backdoor from remote setup
Submitted by grigby1 on Fri, 12/23/2022 - 10:54am
Technological innovation
Windows 7
Msfconsole
metasploit
injection
DLL of meterpreter
backdoor. Armitage
Meterpreter
vulnerabilities
system security
TLS
security
Network
exploit
Windows Operating System Security
operating systems
Linux
composability
Resiliency
Metrics
pubcrawl
biblio
Static Code Analysis Tool for Laravel Framework Based Web Application
Submitted by aekwall on Fri, 11/18/2022 - 2:25pm
security
Computational modeling
Data models
Analytical models
pubcrawl
Resiliency
Human behavior
composability
Manuals
static analysis
Dictionaries
vulnerabilities
codes
static code analysis
taint analysis
Laravel
biblio
The Analysis of Human Attitude toward Cybersecurity Information Sharing
Submitted by grigby1 on Thu, 09/29/2022 - 3:38pm
Organizational learning
Management
vulnerabilities
Bibliographies
information sharing
attitude
behavior
Human Attitude
involvement
best practices
Organizations
pubcrawl
Human behavior
computer security
Cyber-security
Cybersecurity
taxonomy
biblio
Improving Accuracy and Completeness of Source Code Static Taint Analysis
Submitted by aekwall on Thu, 05/19/2022 - 12:38pm
Resiliency
Human behavior
codes
composability
Metrics
programming
pubcrawl
static analysis
static code analysis
taint analysis
vulnerabilities
file
Binary Software Composition Analysis with CodeSentry
Submitted by Katie Dey on Wed, 04/27/2022 - 7:56am. Contributors:
Antonio Flores Montoya
Drew DeHaas
Paul Anderson
Vineeth Kashyap
Abstract
Binary Analysis
N-day
SBOM
software composition analysis
vulnerabilities
HCSS'22
HCSS '22
biblio
Vulnerability Characterization and Privacy Quantification for Cyber-Physical Systems
Submitted by grigby1 on Wed, 04/20/2022 - 9:47am
Computational modeling
CPS Privacy
cyber-physical systems
Cyber-Physical Systems (CPS)
data privacy
differential privacy
Differential Privacy (DP)
Human Factors
Personalized Differential Privacy
privacy
pubcrawl
Publishing
social computing
vulnerabilities
biblio
Modelling Cyber-Risk in an Economic Perspective
Submitted by grigby1 on Mon, 04/18/2022 - 9:56am
machine learning
vulnerabilities
Training
Time series analysis
time-series
Security Risk Estimation
Scalability
Risk
resilience
pubcrawl
Metrics
Management
Adaptation models
Human Factors
econometrics
deep learning
Data mining
Cyber-security
bug-bounties
Biological system modeling
Assessment
Artificial Intelligence
Analytical models
biblio
Cybersecurity Analysis of Wind Farm SCADA Systems
Submitted by grigby1 on Mon, 03/14/2022 - 11:36am
attack surface
Wind power generation
wind energy
Industry 4.0
ICS (industrial control system)
SCADA Systems Security
vulnerabilities
Wind farms
Market research
renewable energy sources
pubcrawl
Compositionality
Computer crime
cyberattack
SCADA systems
industrial control
Resiliency
resilience
Human behavior
1
2
3
4
5
6
7
next ›
last »