Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
vulnerabilities
biblio
Framework for Analyzing the Security of Robot Control Systems
Submitted by grigby1 on Thu, 12/17/2020 - 1:36pm
pubcrawl
vulnerabilities
threats
security system
security of data
security
robots
robotized system
Robotic system
Robot sensing systems
robot operating systems
robot control systems
Resiliency
resilience
Application software
policy-based governance
operating systems
model
mobile robots
malware
Human Factors
Human behavior
group management system
framework
control engineering computing
attacks
attacker
biblio
An Overview of Robot Operating System Forensics
Submitted by grigby1 on Thu, 12/17/2020 - 1:35pm
operating systems
robot operating systems
ROS security
robot operating system forensics
open source operational environment
digital investigation studies
client-server connection
autonomous technologies
Robot Operating System
Service robots
robot programming
vulnerabilities
Industry 4.0
Robot sensing systems
Forensics
privacy
operating systems (computers)
public domain software
Cyber-security
Industries
data privacy
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
Digital Forensics
security
biblio
Trustworthiness Assessment of Web Applications: Approach and Experimental Study using Input Validation Coding Practices
Submitted by aekwall on Mon, 12/07/2020 - 12:30pm
secure code
web applications
Web application
vulnerabilities
trustworthiness assessment
trustworthiness
software security
software quality
security vulnerabilities
security perspective
security of data
Assessment
quality model
pubcrawl
internet
input validation practices
input validation coding practices
feasible security practices results
composability
coding practices
assessment techniques
biblio
A New Security Approach in Telecom Infrastructures: The RESISTO Concept
Submitted by aekwall on Mon, 11/16/2020 - 2:57pm
Telecommunications
Resilient Security Architectures
telecom infrastructures
risk mitigation
RESISTO H2020 EU-funded project
holistic situation awareness
extreme weather events
criminal attacks
natural disasters
disasters
security approach
Communications
threats
security
resilience
5G mobile communication
Software Architecture
Government
Companies
vulnerabilities
pubcrawl
Resiliency
critical infrastructures
critical infrastructure
security of data
biblio
A Comparison of Nano-Patterns vs. Software Metrics in Vulnerability Prediction
Submitted by grigby1 on Wed, 11/04/2020 - 1:36pm
program testing
web services
vulnerable methods
vulnerable code
vulnerability prediction models
Vulnerability
vulnerabilities
software security
software quality
software metrics
Software
security of data
security
pubcrawl
Complexity theory
Predictive models
Object oriented modeling
nanopatterns
nano-pattern
metrics testing
Metrics
method-level traceable patterns
method-level software metrics
Measurement
learning (artificial intelligence)
Java
internet
biblio
Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux System
Submitted by aekwall on Mon, 10/26/2020 - 11:45am
Drone
Weapons
software vulnerabilities
Linux operating system
2.0
AR
AR Drone 2.0
Busybox
CVE
autonomous aerial vehicles
embedded
embedded Linux system
open WiFi network
pairing mode
Parrot
SSH Tunnel
Linux Operating System Security
Metrics
computer network security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
security
tools
vulnerabilities
Vulnerability Analysis
public domain software
wireless LAN
Streaming media
Predictive Metrics
biblio
CONVUL: An Effective Tool for Detecting Concurrency Vulnerabilities
Submitted by grigby1 on Tue, 10/06/2020 - 2:01pm
multi-threading
vulnerabilities
tools
Synchronization
security of data
security
Runtime
Resiliency
resilience
pubcrawl
program diagnostics
multithreaded execution nondeterminism
Clocks
Metrics
Instruments
Instruction sets
cyber physical systems
CPS
CONVUL
Concurrent computing
concurrency vulnerability detection
concurrency control
Concurrency
composability
biblio
Preserving Location Privacy in Cyber-Physical Systems
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
location obfuscation
vulnerabilities
user location information
trust
sensors
security
public adoption
public acceptance
pubcrawl
Proposals
privacy-preserving location service
privacy
mobile computing
Mix-zone
location-obfuscation
location privacy
CPS Privacy
location based services
IoT devices
IoT
Internet of Things
Human Factors
Human behavior
data privacy
cyber-physical systems
cyber physical systems
CPSS
CPS
context-awareness
Conferences
actuators
biblio
Automation Framework for Software Vulnerability Exploitability Assessment
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
common vector scoring system
third-factor access complexity
Structural Severity
software vulnerability exploitability assessment
software structural properties
software development sector
security flaws
secure software
reachability
Entry points
de facto metrics system
CVSS exploitability measures
security of data
automated exploit attack
access vector
software vulnerabilities
security risks
Automated Secure Software Engineering
software engineering
reachability analysis
vulnerabilities
composability
pubcrawl
Resiliency
biblio
Vulnerability Discovery Modelling With Vulnerability Severity
Submitted by grigby1 on Fri, 09/11/2020 - 11:58am
risk analysis
Web browser
vulnerability severity
vulnerability discovery rate
vulnerability discovery process
vulnerability discovery models highlight
vulnerability discovery modelling
Vulnerability discovery model
vulnerability data
vulnerabilities
severity
predictive capability
Browser Security
Compositionality
Browsers
security of data
online front-ends
software vulnerabilities
composability
software fault tolerance
Data models
Mathematical model
Analytical models
Software
resilience
Metrics
Human behavior
pubcrawl
security
Predictive models
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »