Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Runtime
biblio
Software Runtime Accumulative Testing
Submitted by grigby1 on Wed, 11/04/2020 - 12:35pm
Runtime
testing requirement analysis
Testing process
testing
system perspective
Software Testing
Software systems
software runtime accumulative testing
software reliability
software metrics
software engineering
software aging
aging
pubcrawl
program testing
metrics testing
Metrics
Measurement
Hardware
Databases
corresponding testing type
corresponding testing contents
conventional software tests
biblio
Runtime Verification of Hyperproperties for Deterministic Programs
Submitted by grigby1 on Mon, 11/02/2020 - 10:39am
pubcrawl
system monitoring
software doping
Software
security policies
security of data
security
Scalability
safety hyperproperty
Safety
runtime verification problem
runtime verification monitors
runtime verification
Runtime
data minimality
program verification
parametric monitor
noninterference
Monitoring
information-flow policies
information-flow
i/o systems security
i-o systems security
finite element analysis
Doping
deterministic input-output programs
deterministic algorithms
biblio
Smart I/O Modules for Mitigating Cyber-Physical Attacks on Industrial Control Systems
Submitted by grigby1 on Fri, 10/30/2020 - 11:18am
input-output programs
smart I/O modules
security of data
security
Scalability
Safety
runtime enforcement
Runtime
real-world physical systems
pubcrawl
programmable logic controller I/O modules
programmable controllers
production engineering computing
Power Grid
Monitoring
malicious attacks
control engineering computing
Industries
Industrial Control Systems
industrial control
i-o systems security
I-O Systems
hardware architecture
Hardware
embedded systems
embedded control
cyber-physical systems (CPSs)
cyber-physical systems
cyber-physical attacks mitigation
Cyber-physical attacks
CPS
control systems
biblio
KHyperLogLog: Estimating Reidentifiability and Joinability of Large Data at Scale
Submitted by aekwall on Mon, 10/12/2020 - 10:32am
approximate counting techniques
Expert Systems and Privacy
very large databases
reidentifiability
publicly available data sets
pseudonymous identified data sets
proprietary data sets
privacy relevant characteristics
KHyperLogLog
KHLL
joinability risks
joinability analysis
Data-Privacy
data characteristics
Approximate-Counting
Scalability
Data Governance
Approximation algorithms
Human Factors
Indexes
anonymity
Measurement
regression analysis
privacy
pubcrawl
Human behavior
Runtime
Organizations
data privacy
biblio
CONVUL: An Effective Tool for Detecting Concurrency Vulnerabilities
Submitted by grigby1 on Tue, 10/06/2020 - 1:01pm
multi-threading
vulnerabilities
tools
Synchronization
security of data
security
Runtime
Resiliency
resilience
pubcrawl
program diagnostics
multithreaded execution nondeterminism
Clocks
Metrics
Instruments
Instruction sets
cyber physical systems
CPS
CONVUL
Concurrent computing
concurrency vulnerability detection
concurrency control
Concurrency
composability
biblio
Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks
Submitted by aekwall on Mon, 09/21/2020 - 2:46pm
Correlation
confinement
runtime malware detection
real-time malware control strategies
network-level malware confinement
network functionality
Malware propogation
Malware propagation
Malware confinement
lightweight node-level malware detection
average network throughput
predictive control
IoT networks
cyber-physical systems
privacy
computer network security
malware detection
composability
pubcrawl
Resiliency
feature extraction
invasive software
performance evaluation
security
Runtime
malware
Internet of Things
network security
Detectors
biblio
A Probability Prediction Based Mutable Control-Flow Attestation Scheme on Embedded Platforms
Submitted by aekwall on Mon, 08/17/2020 - 10:35am
execution-profiling CFG
operating systems (computers)
coarse-grained check
coarse-grained control-flow attestation schemes
Control Flow Attestation
control-flow security
costly fine-grained level
Embedded Platform Security
embedded software
Predictive models
execution-profiling control-flow graph
fine-grained remote control-flow attestation
MGC-FA
mutable control-flow attestation scheme
mutable granularity control-flow attestation
Mutable Granularity Scheme
remote control-flow attestation scheme
Resiliency
attestation
Remote Attestation
Runtime
security
software integrity
control-flow attacks
embedded systems
Raspberry Pi
security of data
Human behavior
pubcrawl
composability
machine learning
Probabilistic logic
probability
ARM TrustZone
biblio
Analytical Evaluation of k–Anonymity Algorithm and Epsilon-Differential Privacy Mechanism in Cloud Computing Environment
Submitted by grigby1 on Thu, 08/13/2020 - 4:35pm
privacy problem
epsilon-differential privacy mechanism
evaluation
expected risks
Human behavior
k-anonymity algorithm
Metrics
privacy
privacy environment
dilemmas
privacy protection algorithms
pubcrawl
resilience
Resiliency
Runtime
security of data
unexpected risks
Data models
algorithm orientations
analytical evaluation
anonymity
anonymity algorithm
Cloud Computing
cloud computing environment
composability
data analysis
algorithm orientation
data privacy
Data Security
data segregation
Databases
differential privacy
differential privacy algorithm
differential privacy mechanism
biblio
Enhanced dynamic cyber zone defense
Submitted by aekwall on Mon, 07/27/2020 - 11:12am
intrusion tolerance
simulation
security of data
security
Runtime
Resiliency
pubcrawl
moving target defense
Limiting
Laboratories
Intrusion Tolrance
intrusion tolerance technique
Algorithm
information security
Heuristic algorithms
dynamic cyber zone defense
discrete-time simulation
cyber systems
cyber incidents
computer security
composability
Complexity theory
collaboration zones
biblio
A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis
Submitted by aekwall on Mon, 07/20/2020 - 9:54am
Table lookup
white box cryptography
white-box lookup table generation
white-box cryptography
white-box cryptographic implementation
white-box attacks
power analysis
gray-box attack
differential computation analysis
countermeasure
Cryptography
Power demand
encoding
Correlation
Metrics
composability
pubcrawl
Resiliency
Software
Runtime
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »