Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
protection mechanisms
biblio
Malware Containment in Cloud
Submitted by grigby1 on Wed, 12/02/2020 - 1:14pm
graph neural networks
Trusted Computing
trust
smart contracts
pubcrawl
protection mechanisms
Privacy-invasive software
malware
invasive software
hyperledger
Human Factors
Human behavior
high risk trust assumptions
graph theory
blockchain
graph analytics
Dominance Frontier
Distributed databases
decentralized malware containment
Cryptography
contracts
containment process
Containment
Computing Theory
cloud computing environments
Cloud Computing
business processes
biblio
Towards Protection Mechanisms for Secure and Efficient CAN Operation
Submitted by aekwall on Mon, 09/21/2020 - 2:46pm
efficient CAN operation
security solutions
controller area networks
CAN bus
access controller
automotive security
broadband services
CAN data-link layer
CAN Security
Clocks
fault confinement mechanism
iterative research
message priority
numerous proposed solutions
protection mechanisms
real-time message deliverability
secure CAN operation
confinement
Protocols
Automotive engineering
computer network security
telecommunication traffic
authorisation
real-time systems
Resiliency
pubcrawl
composability
automobiles
Industry 4.0
privacy
authentication
Cyber Attacks
cyber-physical systems
error detection
timing
biblio
How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints
Submitted by grigby1 on Fri, 08/18/2017 - 12:49pm
composability
JavaScript
JavaScript engine
protection mechanisms
pubcrawl
Resiliency
Scalability
textlessscptextgreaterxsstextless/scptextgreater
Trust Routing
biblio
SoK: Eternal War in Memory
Submitted by Heather Lucas on Wed, 09/17/2014 - 5:34pm
computer security
memory corruption attacks
memory corruption bugs
program debugging
protection mechanisms
protection techniques
security of data
software reliability
SoK
storage management