Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security of data
biblio
One Size Does Not Fit All: A Grounded Theory and Online Survey Study of Developer Preferences for Security Warning Types
Submitted by aekwall on Mon, 03/15/2021 - 12:09pm
Grounded Theory study
secure software
security tools
14 professional software developers
50 professional software developers
code security
developer preferences
developer security warnings
development tools
compiler security
Qualitative research
security checkers
security warning types
security warnings
static analysis engines
warning interactions
warning type
security of data
Compositionality
security issues
program diagnostics
software development
static analysis
software engineering
machine learning
tools
Metrics
pubcrawl
Resiliency
Software
security
Organizations
Scalability
biblio
Security across abstraction layers: old and new examples
Submitted by aekwall on Mon, 03/15/2021 - 12:08pm
Context modeling
successive layers
source programming language
source code level
single level
ISA
Instruction Set Architecture
ICT system
ICT application
higher level abstractions
cross-layer security issues
cross-layer nature
cross-layer issues
abstraction layers
operating systems
security
compiler security
secure compilation
Computer languages
program compilers
Instruction sets
Compositionality
security issues
Java
Metrics
pubcrawl
Resiliency
Hardware
Scalability
security of data
biblio
Gap between Theory and Practice: An Empirical Study of Security Patches in Solidity
Submitted by aekwall on Mon, 03/15/2021 - 12:07pm
contracts
vulnerability patches
Solidity team
Solidity
security patches
real-world Solidity contracts
real-world Ethereum smart contracts
potentially vulnerable contracts
missing security patches
Ethereum smart contract developers
empirical study
smart contract security
Manuals
electronic commerce
compiler security
C++ language
security of data
program compilers
Compositionality
encoding
program diagnostics
smart contracts
security vulnerabilities
static analysis
software engineering
tools
Metrics
pubcrawl
Resiliency
security
telecommunication security
Scalability
biblio
Computational Intelligence Towards Trusted Cloudlet Based Fog Computing
Submitted by grigby1 on Tue, 03/09/2021 - 3:06pm
Scalability
optimisation
popular trust
pubcrawl
quality of service
Reliability
reputation
required trusted platform module
resilience
Resiliency
multiple cloudlets
security
security of data
tpm
trust
trust value
trust-based reputation
trusted cloudlet-based fog platform
uncertainty
Fog computing
BIOS
Cloud Computing
cloud-based services
cloudlet
cloudlet trustworthy
cloudlet-based fog computing
computational intelligence
computationally intelligent approaches
edge computing
Bio-inspired Intelligent
Fuzzy logic
fuzzy logic-based inference
Human behavior
Internet of Things
IoT user
Mathematical model
Metrics
mobile computing
biblio
Brain-Computer Interface based User Authentication System for Personal Device Security
Submitted by grigby1 on Tue, 03/09/2021 - 3:03pm
recurrent neural network
mentally selected circle
mentally uttered number
Metrics
particle filter
password
personal device security
PF
pubcrawl
recurrent neural nets
Kalman filters
resilience
RNN
security
security of data
SSVEP brain pattern
two stage security verification
user authentication system
visual evoked potentials
brain-computer interface system
Human behavior
Scalability
Resiliency
3 × 3 spatial matrix
BCI
biometric security
BIOS
brain
brain pattern classification
pattern locks
brain-computer interfaces
CCA
EKF
electroencephalography
EMD
ERNN
extended-Kalman filter
flickering circle
biblio
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain
Submitted by grigby1 on Tue, 03/09/2021 - 2:50pm
proof-of-work blockchain
honest-majority
Human behavior
modeling analysis
network connectivity
network modeling
node behavior
Peer-to-peer computing
PoW blockchain
Probabilistic logic
honest-but-potentially-colluding
Protocols
pubcrawl
Scalability
security
security impact
security of data
Security Properties
telecommunication security
consensus voting power
Analytical models
bitcoin
blockchain
blockchain forks
blockchain system
central trusted authority
consensus protocol
consensus security
analytical model
Cryptographic Protocols
Cryptography
Data mining
design system
different adversary models
distributed consensus system
electronic money
financial data processing
biblio
Design and Implementation of NIDS Notification System Using WhatsApp and Telegram
Submitted by grigby1 on Tue, 03/09/2021 - 2:39pm
notification platform
whatsapp
Telegram
telecommunication traffic
SYN flood attacks
SSH brute force attacks
social networking (online)
Social network services
Snort
Servers
security of data
real-time systems
pubcrawl
policy-based governance
packet data traffic
administrator
Notification
NIDS notification System
NIDS
network intrusion detection system
IP networks
Intrusion Detection
Human Factors
Human behavior
Force
Floods
Death attacks
brute force attacks
attack time
attack port
biblio
Reliability Analysis of Concurrent Data based on Botnet Modeling
Submitted by grigby1 on Tue, 03/09/2021 - 2:23pm
network modelling
unsolicited e-mail
time series
telecommunication traffic
spam
security risks
security of data
Resiliency
resilience
reliability analysis
Reliability
pubcrawl
pattern clustering
network traffic time series
botnet modeling
multidimensional permutation entropy
Metrics
invasive software
high-privilege systems
Entropy
detection methods
data complex structure analysis
concurrent data
computer network security
composability
clustering variance method
botnets
biblio
Robust Early Stage Botnet Detection using Machine Learning
Submitted by grigby1 on Tue, 03/09/2021 - 2:22pm
pubcrawl
invasive software
learning (artificial intelligence)
machine learning classifiers
malware
Metrics
PCA
principal component analysis
Protocols
identity theft
Random Forest
resilience
Resiliency
robust early stage botnet detection
security of data
Servers
Support vector machines
telecommunication security
cyberattacks
Botnet detection
botnet detection techniques
botnets
click fraud
Command and Control Channel (C&C)
composability
Computer crime
computer network security
botnet
Cybersecurity
DDoS
early-stage botnet detection
efficient detection rate
feature extraction
feature selection techniques
fraud
biblio
Software architecture for the application of facial recognition techniques through IoT devices
Submitted by aekwall on Tue, 03/09/2021 - 11:58am
neural network
Transportation
Systematics
Software measurement
software architecture proposal
Software Architecture
Software
security of data
Scalability
Resiliency
pubcrawl
process control
personal data
biometric encryption
Metrics
IoT devices
Internet of Things
feature extraction
facial recognition time
facial recognition techniques
facial recognition
face recognition
encryption
data privacy
biometrics (access control)
Big Data
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »