Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Payloads
biblio
Automatic Generation of Different Malware
Submitted by grigby1 on Mon, 02/07/2022 - 3:43pm
Payloads
mobil malware
malware static analysis
malware dynamic analysis
automated malware generation
software development management
Malware Analysis
malware dataset
sockets
malware
privacy
static analysis
programming
internet
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Systematically Encoded Polynomial Codes to Detect and Mitigate High-Status-Number Attacks in Inter-Substation GOOSE Communications
Submitted by grigby1 on Mon, 10/04/2021 - 2:04pm
Metrics
Substations
substation automation
Resiliency
pubcrawl
power system security
Payloads
parity check codes
object oriented security
network security
multicast communications
Communication system security
message authentication
linear codes
information security
Industrial Communication
Generators
encoding
cyber-physical systems
Cryptography
composability
biblio
Defense Against on-Chip Trojans Enabling Traffic Analysis Attacks
Submitted by aekwall on Thu, 09/30/2021 - 10:43am
Trojan horses
Hardware
Routing
pubcrawl
Scalability
Metrics
Resiliency
traffic control
Payloads
simulated annealing
NoC
hardware trojan
obfuscation
Program processors
routineg
network on chip security
biblio
Basic Block Encoding Based Run-Time CFI Check for Embedded Software
Submitted by grigby1 on Thu, 09/16/2021 - 1:02pm
Aerospace electronics
composability
Human behavior
Human Factors
Payloads
Pipelines
process control
programming
pubcrawl
resilience
Resiliency
return oriented programming
Runtime
Scalability
Very large scale integration
biblio
Detecting Security Vulnerabilities in Website using Python
Submitted by aekwall on Thu, 06/24/2021 - 10:55am
Conferences
security
Resiliency
pubcrawl
composability
tools
vulnerabilities
Python
Automated Response Actions
information technology
Payloads
Communication Systems
Cross Site Scripting
OWASP
biblio
JavaScript malware behaviour analysis and detection using sandbox assisted ensemble model
Submitted by grigby1 on Wed, 05/05/2021 - 11:56am
Payloads
Voted Perceptron
Training
tools
Sequential Minimal Optimization
Scalability
sandboxing
sandbox
pubcrawl
policy-based governance
AdaBoost
malware
JavaScript
feature extraction
Computational modeling
composability
collaboration agreements
collaboration
Analytical models
biblio
Optimizing Away JavaScript Obfuscation
Submitted by grigby1 on Wed, 05/05/2021 - 11:43am
Open Source Software
tools
static analysis
Safe Coding
Resiliency
resilience
pubcrawl
policy-based governance
Payloads
collaboration
obfuscation
Metrics
Manuals
malware
JavaScript
internet
Human Factors
Human behavior
biblio
Challenges of Return-Oriented-Programming on the Xtensa Hardware Architecture
Submitted by aekwall on Mon, 05/03/2021 - 12:06pm
return oriented programming
Algorithms
composability
computer architecture
Human Factors
Instruction sets
Payloads
pubcrawl
Registers
Resiliency
rop attacks
Scalability
Task Analysis
Windows
biblio
On Runtime Software Security of TrustZone-M Based IoT Devices
Submitted by aekwall on Mon, 05/03/2021 - 12:06pm
pubcrawl
TrustZone
software security
security
Scalability
Runtime
rop attacks
Resiliency
Random access memory
return oriented programming
Payloads
microcontroller
malware
Internet of Things
Human Factors
encoding
composability
biblio
An IDS Rule Redundancy Verification
Submitted by grigby1 on Fri, 04/09/2021 - 10:33am
Syntactics
Snort rule combinations
Snort community
public rulesets
open-source IDS system
network security software
IDS rule verification
IDS rule redundancy verification
commented rules
anomaly network traffics
Snort
IDS
resilience
tools
Semantics
Redundancy
Payloads
telecommunication traffic
composability
intrusion detection system
Protocols
computer network security
Resiliency
pubcrawl
IP networks
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »