Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Web server
biblio
Developing Computer Applications without any OS or Kernel in a Multi-core Architecture
Submitted by grigby1 on Tue, 02/22/2022 - 12:42pm
Bare Machine Computing
computer architecture
pubcrawl
Metrics
UDP
Multicore processing
codes
operating system security
multicore
Web servers
Web server
multicore computing security
resilience
Resiliency
Scalability
process control
Prototypes
architecture
biblio
A Practical Exercise System Using Virtual Machines for Learning Cross-Site Scripting Countermeasures
Submitted by grigby1 on Wed, 02/10/2021 - 12:19pm
Resiliency
XSS countermeasures
XSS attacks
Web servers
Web server
Web pages
Web Browser Security
Web browser
web applications
Virtual machining
virtual machines
tools
Software
security of data
Scalability
virtual machine security
resilience
public domain software
pubcrawl
practical exercise system
online front-ends
learning cross-site scripting
internet
Human behavior
cross-site scripting
Cross Site Scripting
computer science education
Browsers
security
virtual machine
biblio
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments
Submitted by grigby1 on Mon, 03/23/2020 - 3:16pm
pubcrawl
Web server
untrusted networks
untrusted environments
telecommunication control
tailoring onion routing
Servers
secret supply chain procedures
Routing
Router Systems Security
resource-constrained IoT devices
resource-conserving access control
Resiliency
resilience
computer network security
Protocols
protocol incompatibilities
Metrics
IoT device owner
IoT communication
Internet of Things
Internet connectivity
end-to-end security
data privacy
Cryptography
Cryptographic Protocols
cryptographic processing
biblio
Reducing attack surface corresponding to Type 1 cross-site scripting attacks using secure development life cycle practices
Submitted by aekwall on Mon, 12/16/2019 - 1:17pm
malware
XSS
Web users
Web sites
Web server
Web response
Web request
Web based application vulnerabilities
Uniform resource locators
secure development life cycle practices
Scalability
resilience
pubcrawl
online front-ends
nonpersistent cross-site scripting attack
non-persistent
attack
malicious links
malicious functions
Libraries
legitimate Web site
Internet based application
internet
Human behavior
encoding
cross-site scripting
Cross Site Scripting
clients Web browser
client-side code injection attack
Browsers
attack surface
biblio
Amazon Echo Enabled IoT Home Security System for Smart Home Environment
Submitted by aekwall on Mon, 08/05/2019 - 9:34am
internet
wireless sensor networks
Web server
user voice commands
ultralow-power wireless sensor network
Speech recognition
smart home environment
Smart Home
sensors
Resiliency
pubcrawl
IoT
Internet-connected system
Internet of Things
Internet accessible configuration page
Amazon Echo
Home Security System
home computing
home automation
Flowcharts
file servers
expandability
computer network security
composability
Cameras
bluetooth low energy
Bluetooth 4
Bluetooth
BLE
Amazon Echo enabled IoT home security system
biblio
Analysis of UDP DDoS flood cyber attack and defense mechanisms on Web Server with Linux Ubuntu 13
Submitted by grigby1 on Tue, 03/07/2017 - 12:38pm
Linux
Web servers
Web server
UDP DDoS flood cyber attack
transport protocols
Throughput
threshold limit
TCP throughput
security problems
round-trip time
reverse path forwarding
pubcrawl170109
network load balancing
Linux Ubuntu 13
Linux platform
access control lists
IP verify
IP networks
Internet world
internet
Floods
file servers
distributed denial of service attacks
defense mechanisms
CPU utilization
Computers
computer network security
Computer crime
authorisation
ACL
biblio
Application H-Secure for mobile security
Submitted by BrandonB on Mon, 05/04/2015 - 12:16pm
mobile operating system
Graphical Password
graphical user interfaces
H-Secure application
invasive software
malicious code
malware
Mobile communication
mobile computing
Mobile handsets
free-download content
mobile operating systems
mobile security applications
open devices
personal data
private key cryptography
Servers
smart phones
unauthorized person
Web server
confidential file storage
Android (operating system)
Android smart phones
application stores
authentication
authorisation
business applications
business data
confidential business information
confidential data storage
AES Encryption and Decryption
data access
decryption process
destination servers
employee-owned device
encrypted file
encryption
encryption key
free-download apps
biblio
Bootstrapping Trust in Commodity Computers
Submitted by rvmeush on Fri, 09/26/2014 - 12:04pm
Humans
Web server
Trusted Platform Module
Trusted Computing
trust
tpm
Secure Boot
privacy
information security
Banking
Hardware
Data Security
computer security
Code Identity
Central Processing Unit
Cellular phones
Bootstrap