Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security features
biblio
Mobile bootloader with security features
Submitted by grigby1 on Tue, 11/17/2020 - 2:40pm
program testing
Operating systems security
software design
security features
modern mobile operating systems
mobile development
mobile bootloader
excessive information
device internal storage
described problem
bootloading stage
bootloader
Booting
Software Testing
security of data
operating systems (computers)
resilience
software engineering
computer security
smart phones
mobile computing
composability
information security
Cryptography
Resiliency
Metrics
pubcrawl
system logs
biblio
Security in iOS and Android: A Comparative Analysis
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
android
iOS Security
permission analysis
ios
hybrid mobile application
Apache Cordova
iOS (operating system)
security features
Permission
Compositionality
user privacy
mobile devices
Android (operating system)
security of data
Human Factors
internet
Metrics
privacy
pubcrawl
Resiliency
mobile computing
Kernel
security
Hardware
data privacy
biblio
To Detect Malware attacks for an Autonomic Self-Heal Approach of Virtual Machines in Cloud Computing
Submitted by grigby1 on Mon, 03/09/2020 - 1:25pm
public cloud services
Virtual machining
virtual machines memory snapshots API call sequences
virtual machines
virtual machine snapshots
virtual machine security
Virtual machine monitors
unsupervised machine
unattacked virtual machine memory snapshots
supervised machine learning techniques
self-heal approach
self-heal algorithm
Self-Heal
security features
security
API calls
pubcrawl
private cloud environment
private cloud
operating systems
Monitoring
malware attacks
malware
machine learning algorithms
learning (artificial intelligence)
invasive software
Cloud Computing
attack model
application program interfaces
biblio
Will Blockchain Technology Become a Reality in Sensor Networks?
Submitted by aekwall on Mon, 02/17/2020 - 2:34pm
telecommunication network routing
sensor networks
security features
resource-constrained wireless sensor network
private communication blockchain framework
memory storage
load balancing multihop routing shares
LBMH routing shares
control overhead reduction
constant bit rate
computation power
cluster heads
cluster head
battery life
blockchain technology
sensor security
telecommunication security
resource allocation
blockchain
Metrics
Computational modeling
sensor nodes
Peer-to-peer computing
Routing
wireless sensor networks
batteries
composability
pubcrawl
Human behavior
Resiliency
security
biblio
Enhanced Uptime and Firmware Cybersecurity for Grid-Connected Power Electronics
Submitted by aekwall on Mon, 02/17/2020 - 2:22pm
hardware-assisted monitor
distributed energy resource prototype
embedded Linux
encrypted serial communication
firmware cybersecurity
firmware integrity
firmware run-time integrity security
firmware run-time security feature
firmware updating
Grid Security
grid-connected power electronics
digital signal processors
Heart beat
multi-mission controls
operational technology security
power electronics security
power electronics uptime
power flow
run-time security
security techniques
uptime
firmware
Monitoring
Hardware
security
Linux
Resiliency
pubcrawl
composability
Metrics
Cybersecurity
privacy
security of data
power engineering computing
power system security
control systems
power grids
signal processing security
digital signal processing chips
Microprogramming
power electronics
security features
biblio
Intelligent security lock
Submitted by grigby1 on Thu, 08/23/2018 - 11:35am
intrusion detection system
software system
smart electronic/digital door locking system
Smart Door Lock
security features
Resiliency
resilience
real time camera surveillance
pubcrawl
mobile computing
Mobile app
message authentication
lock device
Live Camera Feeds
keys (locking)
Bluetooth
intrusion detection notification
Intrusion Detection
Intelligent Security Lock prototype
human factor
Human behavior
face recognition
doors
Conferences
comprehensive security requirements
composability
Cameras
bluetooth security
Bluetooth Lock
authentication
biblio
On the security of SDN-enabled smartgrid systems
Submitted by grigby1 on Wed, 02/21/2018 - 1:50pm
smart grid security
Scalability
SDN
SDN networks
SDN-enabled smartgrid system security
security
security features
security problems
security solutions
smart grid communication network
Resiliency
smart grid system
Smart Grids
smart power grids
SmartGrid
software defined networking
Software Defined Networks
Switches
vulnerabilities
internet
Communication networks
computer centres
Computer crime
computer network security
critical infrastructure systems
Cyber Attacks
data center networks
DDoS
attack scenarios
Metrics
network topology
networking paradigm
Phasor measurement units
power engineering computing
power system security
pubcrawl
resilience
biblio
Data Protection in OpenStack
Submitted by grigby1 on Tue, 01/16/2018 - 6:33pm
operational cloud deployment
virtual machines
virtual machine images
storage encryption
security of data
security features
Security analysis
Scalability
Resiliency
public domain software
pubcrawl
Pervasive Computing Security
Organizations
basic security controls
OpenStack range
Open Source Software
open source cloud computing platform
Neutrons
Metrics
Human Factors
Hardware
encryption
Data Security
Data protection
cloud providers
Cloud Computing
biblio
An MEBN framework as a dynamic firewall's knowledge flow architecture
Submitted by BrandonB on Wed, 05/06/2015 - 9:21am
MEBN framework
statistical distributions
stateless traditional static filters
stateful inspection
Signal processing algorithms
Semantics
semantic threat graph
security features
Probability distribution
probabilistic ontology
Probabilistic logic
ontologies (artificial intelligence)
Ontologies
multi entity Bayesian networks
MEBN logic
Bayes methods
MEBN
knowledge flow architecture
graphical models
futuristic threat prevention technique
first order theory
firewalls
feature extraction
explicit rule inclusion
dynamic firewalls
data flow computing
data flow architecture
belief networks
Bayesian networks
biblio
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment
Submitted by BrandonB on Tue, 05/05/2015 - 8:57am
interoperable operations
Servers
security features
seamless integration
Robustness
robust authentication scheme
Resource Observation
resource consuming secure algorithms
physical objects
Payloads
participating entities
authentication
Internet of things environment
Internet of Things (IoT)
Internet of Things
internet
digital world
Cryptography
Conditional Option
computationally complex algorithms
CoAP
authorisation
1
2
next ›
last »