Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
software tools
biblio
Scaling Application-Level Dynamic Taint Analysis to Enterprise-Scale Distributed Systems
Submitted by grigby1 on Mon, 11/29/2021 - 2:27pm
Complexity theory
composability
distributed systems
dynamic taint analysis
faces
Metrics
new bugs
pubcrawl
Scalability
software engineering
software tools
static analysis
taint analysis
tools
biblio
XAI-Based Fuzzy SWOT Maps for Analysis of Complex Systems
Submitted by aekwall on Mon, 03/01/2021 - 5:00pm
Optimized production technology
XAI-Based system analysis
SWOT+CWW network
SWOT analyses
software tool
fuzzy SWOT maps network structure
Fuzzy SWOT Maps
explanation
explainable artificial intelligence
Dynamic SWOT analysis
computing with words
Fuzzy cognitive maps
Scalability
xai
FCM
cognitive systems
Artificial Intelligence
complex systems
cognition
software tools
fuzzy set theory
pubcrawl
Resiliency
real-time systems
biblio
Software Development of Electronic Digital Signature Generation at Institution Electronic Document Circulation
Submitted by aekwall on Mon, 02/08/2021 - 1:45pm
Consumer electronics
Web-interface
software tools
secure key storage
institution electronic document circulation
GOST RF Standard 34.10–2018
electronic document circulation
electronic digital signature generation
documented information exchanging
cryptographic module
central Web-server
blockchain storage of electronic signatures
blockchain storage
ECDSA
Scalability
electronic digital signature
DSA
document handling
RSA
Information systems
digital signatures
software development
software engineering
blockchain
pubcrawl
Resiliency
Software
Cryptography
biblio
Challenges in ROS Forensics
Submitted by grigby1 on Thu, 12/17/2020 - 1:36pm
robot hack acquistion
Peer-to-peer computing
policy-based governance
pubcrawl
RAT
remote administration tool
resilience
Resiliency
robot behavior
Robot hack
peer to peer application
Robot Operating System
robot operating systems
Robot sensing systems
ROS forensics
security
security attacks
Service robots
software tools
Transport Layer Security
Human behavior
communication link
computer network security
confidential security purposes
cyber-physical security threats
Denial-of-Service
Digital Forensics
Forensics
Forensics acquisition and data recovery
Gazbo Turtlebot simulator
availability attacks
Human Factors
integrity attacks
internet
mobile computing
mobile robots
Network connections
network system
operating systems
biblio
SoCINT: Resilient System-on-Chip via Dynamic Intrusion Detection
Submitted by grigby1 on Mon, 11/02/2020 - 12:29pm
Monitoring
Trojan horses
system-on-chip
software tools
SoCs
SoCINT
security
Runtime system
Resiliency
resilience
Registers
pubcrawl
policy-based governance
open source processor
composability
IP networks
Intrusion Detection
intellectual property security
intellectual properties
industrial property
Hardware Trojans
hardware tracing
Hardware Security
Hardware
FPGA platform
field programmable gate arrays
dynamic intrusion detection approach
biblio
A Scaffolding Design Framework for Developing Secure Interoperability Components in Digital Manufacturing Platforms
Submitted by grigby1 on Mon, 11/02/2020 - 11:40am
program logic controllers
virtual open operating system
vf-OS security command centre
vf-OS IO toolkit generator
vf-OS IO components
system security
System Interoperability
software tools
software scaffolding
software applications
security of data
secure interoperability components
Scalability
scaffolding design framework
pubcrawl
programmable controllers
code generation technique
platform security
platform integration automation
operating systems (computers)
open systems
legacy file formats
i/o systems security
i-o systems security
human computer interaction
Fi-Ware
enterprise resource planning systems
enterprise resource planning
Digital manufacturing platforms
Cybersecurity
cyber-physical systems
Connected Smart Factories
biblio
Smarter Smart Contract Development Tools
Submitted by grigby1 on Fri, 03/27/2020 - 11:29am
program debugging
usability of programming languages
tools
software tools
software engineering
Software
smarter smart contract development
smart contracts
security vulnerabilities
security of data
Safe Coding
Resiliency
resilience
pubcrawl
Programming Language
blockchain
program compilers
policy-based governance
Metrics
Human Factors
Human behavior
contracts
Computer languages
Computer bugs
collaboration
buggy code
blockchain software engineering tool set
blockchain software development tools
blockchain platforms
blockchain environments
biblio
Attack Modeling and Verification for Connected System Security
Submitted by aekwall on Wed, 05/01/2019 - 1:05pm
SysML connectivity profile
pubcrawl
Resiliency
security
security of data
Software Architecture
software tools
static system modeling
SysML
program verification
system security specifications
system specifications
system validation
system verification
systems engineering
Systems modeling
Temporal Logic
Unified modeling language
error propagation
Attack Modeling
composability
connected system security
critical systems
dynamic system modeling
Dynamical Systems
embedded systems
error detection
Adaptation models
extended attack tree
Formal Specification
IoT
Metrics
model checker
model checking
Petri nets
program diagnostics
biblio
FP -TESTER : Automated Testing of Browser Fingerprint Resilience
Submitted by grigby1 on Fri, 04/05/2019 - 10:27am
Browser Security
testing toolkit
software tools
privacy leaks
FP-TESTER
browser vendors
browser tracking
browser fingerprint resilience
Automated Testing
Resiliency
Statistics
Sociology
program testing
Compositionality
privacy
Fingerprint recognition
Browser Fingerprinting
online front-ends
Entropy
Browsers
Metrics
Human behavior
pubcrawl
resilience
testing
security of data
data privacy
internet
biblio
Securing Concurrent Lazy Programs Against Information Leakage
Submitted by grigby1 on Thu, 08/23/2018 - 11:57am
information-flow control tools
concurrency control
Agda proof assistant
concurrent lazy programs security
covert channel
functional languages
functional programming
Haskell libraries
IFC libraries
IFC tools
Information Leakage
lazy calculus
lazy evaluation
lazy languages
lazyDup
Message systems
noninterference
security library MAC
software libraries
Writing
data structures
Theorem Proving
Haskell
Concurrency
cyber-physical systems
pubcrawl
composability
security of data
data privacy
Sensitivity
security
program diagnostics
resilience
Metrics
Libraries
Lattices
timing
Resiliency
software tools
1
2
next ›
last »