Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Java
biblio
Research on Key Technology of Software Intellectual Property Protection
Submitted by grigby1 on Wed, 06/08/2022 - 10:19am
pubcrawl
policy-based governance
resilience
Resiliency
Heuristic algorithms
composability
Java
Software algorithms
reverse engineering
intellectual property
software protection
intellectual property security
obfuscation
codes
software intellectual property protection
SOPM
biblio
SecuCheck: Engineering configurable taint analysis for software developers
Submitted by aekwall on Thu, 05/19/2022 - 1:36pm
composability
Conferences
domain-specific languages
integrated development environment
Java
Metrics
pubcrawl
Runtime
security
Software
static analysis
taint analysis
tools
biblio
Power Grid Data Confirmation Model Based on Behavior Characteristics
Submitted by aekwall on Fri, 05/06/2022 - 12:51pm
behavior control
Cloud Computing
Compositionality
Computational modeling
Data audit
data encryption
Data processing
Database systems
encryption audits
Java
power grids
Predictive Metrics
privacy protection
pubcrawl
Resiliency
Structured Query Language
biblio
CLASA : a Cross-Layer Agent Security Architecture for networked embedded systems
Submitted by aekwall on Tue, 04/19/2022 - 11:18am
security
embedded systems
Software
trust
computer architecture
software reliability
Resiliency
composability
Java
Product design
Reliability engineering
pubcrawl
CPS
cross-layer
Cross Layer Security
biblio
A Model-Driven Framework for the Prevention of DoS Attacks in Software Defined Networking (SDN)
Submitted by aekwall on Mon, 03/14/2022 - 1:44pm
Acceleo
Router Systems Security
Sirius tool
OFP
networking
Model-To-Text
Model Driven Code Transformation
Meta-Model
MDE
Local Area Network Denial
Drag
software reliability
denial of service
Predictive Metrics
Topology
Java
Resistance
Resiliency
pubcrawl
Switches
SDN
tools
biblio
Three-Pass Protocol Scheme for Securing Image Files Using the Hill Cipher 3x3 Algorithm
Submitted by grigby1 on Mon, 01/10/2022 - 12:18pm
Protocols
Three-Pass Protocol
System testing
Software algorithms
Scalability
Resiliency
resilience
Receivers
pubcrawl
android encryption
Metrics
Java
Human behavior
Hill Cipher
Force
Cryptography
Ciphers
biblio
Big Data and its Analyzing Tools : A Perspective
Submitted by aekwall on Tue, 08/17/2021 - 4:10pm
Fault tolerant systems
Storms
Sparks
Spark
Kerberos Mechanism
Java
HDFS
Hadoop
Bull-eye
BIGDATA
security
fault tolerance
Human behavior
Resiliency
Metrics
pubcrawl
Kerberos
tools
Cryptography
biblio
A Neural Embedding for Source Code: Security Analysis and CWE Lists
Submitted by grigby1 on Thu, 06/24/2021 - 10:51am
pubcrawl
vulnerability classification
Training
Syntactics
supervised learning
static analysis
source code embedding
Software
security
resilience
Pervasive Computing Security
natural language processing
Java
composability
Autonomic Security
Metrics
Human Factors
Scalability
Resiliency
biblio
Concurrency Analysis of Go and Java
Submitted by grigby1 on Tue, 06/01/2021 - 2:43pm
Java
pagerank
matrix multiplication
Go
Concurrency
Concurrent computing
Instruction sets
Web pages
Task Analysis
security
Libraries
Benchmark testing
composability
Resiliency
resilience
Metrics
pubcrawl
biblio
PASAPTO: Policy-aware Security and Performance Trade-off Analysis–Computation on Encrypted Data with Restricted Leakage
Submitted by grigby1 on Thu, 04/29/2021 - 2:17pm
Cryptography
Decision trees
Heuristic algorithms
Java
optimization
policy-based governance
pubcrawl
security policies
Time measurement
1
2
3
4
5
6
7
8
9
next ›
last »