Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Performance analysis
biblio
MITOS: Optimal Decisioning for the Indirect Flow Propagation Dilemma in Dynamic Information Flow Tracking Systems
Submitted by grigby1 on Mon, 11/29/2021 - 2:29pm
Metrics
taint analysis
tag propagation
Spatiotemporal phenomena
Semantics
pubcrawl
Performance analysis
optimization
Open Source Software
composability
Measurement
Iterative algorithms
in memory attacks
indirect flows
Fingerprint recognition
DTA
DIFT
biblio
Compositional Taint Analysis of Native Codes for Security Vetting of Android Applications
Submitted by grigby1 on Mon, 11/29/2021 - 2:27pm
Binary Analysis
composability
dynamic programming
Explosions
Function Summaries
Metrics
Mobile Security
operating systems
Performance analysis
privacy
pubcrawl
static analysis
Symbolic Execution
taint analysis
tools
biblio
Neutaint: Efficient Dynamic Taint Analysis with Neural Networks
Submitted by grigby1 on Mon, 11/29/2021 - 2:27pm
composability
fuzzing
Metrics
Neural networks
Performance analysis
pubcrawl
Runtime
security
taint analysis
Task Analysis
tools
biblio
"Digital Bombs" Neutralization Method
Submitted by grigby1 on Tue, 09/21/2021 - 3:52pm
malware
Weapons
static analysis
Resiliency
resilience
pubcrawl
privacy
Performance analysis
Metrics
Malware Analysis
Algorithms
Human behavior
graph theory
Grammar
dynamic control automaton
dynamic analysis
control graph
checkpoints
automata
Analytical models
biblio
Context-Based Forwarding for Mobile ICNs
Submitted by aekwall on Tue, 09/07/2021 - 11:20am
delays
Reliability
Bandwidth
pubcrawl
Scalability
Resiliency
Ad hoc networks
Urban areas
forwarding
ICNs
mobile nodes
network mobility
Performance analysis
coupled congestion control
biblio
An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs
Submitted by grigby1 on Tue, 08/31/2021 - 11:04am
insider attacks
static analysis
Resiliency
resilience
relational database security
pubcrawl
Performance analysis
Monitoring
Metrics
Anomaly Detection
Human behavior
Hidden Markov models
Databases
database
data leakage
composability
application profile
biblio
Realizing A Composable Enterprise Microservices Fabric with AI-Accelerated Material Discovery API Services
Submitted by aekwall on Wed, 08/11/2021 - 2:51pm
microservices architecture
tools
Systematics
security
Scalability
Resiliency
pubcrawl
policy-based governance
Performance analysis
Organizations
API fabric
Metrics
material discovery
Internet-scale Computing Security
Human behavior
Fabrics
composable enterprise services
composability
Cloud Computing
biblio
Group Instance: Flexible Co-Location Resistant Virtual Machine Placement in IaaS Clouds
Submitted by grigby1 on Thu, 07/08/2021 - 2:25pm
resource management
virtual machine security
virtual machine
virtual machine placement
co-location attacks
Cyber Physical System
Performance analysis
Resistance
Cloud Security
Cryptography
Measurement
Virtual machining
composability
Resiliency
resilience
pubcrawl
security
Cloud Computing
biblio
EAC: Encryption Access Control Scheme for Policy Revocation in Cloud Data
Submitted by grigby1 on Wed, 05/26/2021 - 11:37am
Access Control
access policy
Ciphertext policy attributes-based encryption (CP-ABE)
Cloud Computing
collaboration
CP-ABE
Cryptography
encryption
Performance analysis
Policy Based Governance
policy revocation
pubcrawl
Scalability
Servers
Systems architecture
Updating Policy Level
biblio
Performance Analysis of IDS Snort and IDS Suricata with Many-Core Processor in Virtual Machines Against Dos/DDoS Attacks
Submitted by grigby1 on Fri, 04/09/2021 - 11:32am
Central Processing Unit
testing
virtual machine
Performance analysis
IDS
Telecommunications
transport protocols
DoS
denial-of-service attack
operating systems (computers)
IDS Snort version
IDS Suricata
many-core processor
physical machine
Snort
Suricata
TCP Flood attack test
IP networks
resilience
DDoS
virtual machines
Virtual machining
DDoS Attacks
multiprocessing systems
telecommunication traffic
composability
Wireless communication
intrusion detection system
wireless sensor networks
microprocessor chips
computer network security
Resiliency
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »