Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Libraries
biblio
Expert system with Fuzzy logic for protecting Scientific Information Resources
Submitted by grigby1 on Mon, 03/29/2021 - 2:04pm
Algorithm
Cyber Physical System
Databases
expert system
expert systems
Fuzzy logic
information security
Libraries
Metrics
protecting information resources
pubcrawl
resilience
Resiliency
security
Task Analysis
tools
biblio
A Benchmarking of the Effectiveness of Modular Exponentiation Algorithms using the library GMP in C language
Submitted by aekwall on Mon, 03/22/2021 - 1:13pm
Scalability
Cryptography
Resiliency
pubcrawl
computational intelligence
Libraries
public key cryptography
Complexity theory
RSA
Benchmark testing
cryptology
C languages
Registers
exponentiation
C language
average complexity evaluation exponentiation algorithm
Fast Exponentiation Algorithms
Joye ladder exponentiation algorithm
left-to-right signed digit square exponentiation algorithm
left-to-right square and multiply exponentiation algorithm
library GMP
modular exponentiation algorithms
Montgomery ladder exponentiation algorithm
multiply left-to-right square and multiply always right-to-left square and multiply always exponentiation algorithm
Public Key Cryptography.
right-to-left square and multiply exponentiation algorithm
word length 1024.0 bit
biblio
Extracting Taint Specifications for JavaScript Libraries
Submitted by grigby1 on Mon, 03/15/2021 - 1:10pm
access path mechanism
authoring languages
command injection attacks
composability
cross-site scripting
dynamic analysis
Entry points
exit points
JavaScript applications
JavaScript libraries
Libraries
Metrics
Node.js platform
npm repository
package dependency structure
program diagnostics
program testing
pubcrawl
resilience
Resiliency
security
security of data
security vulnerabilities
software engineering
static analysis
static analysis tools
taint analysis
taint sinks
taint specifications
test suites
testing
third-party libraries
tools
Writing
biblio
Comprehensive Java Metadata Tracking for Attack Detection and Repair
Submitted by grigby1 on Mon, 03/15/2021 - 1:09pm
arrays
command injection attacks
composability
Computer errors
computer security
Containers
Instruments
Intrusion Detection
Java
Libraries
maintenance engineering
metadata
Metrics
pubcrawl
resilience
Resiliency
software safety
biblio
Securing Asynchronous Exceptions
Submitted by aekwall on Mon, 03/15/2021 - 12:09pm
compiler security
Compositionality
concurrency control
Concurrent computing
data structures
different covert channels
features asynchronous exceptions
IFC language
Instruction sets
language constructs
language-based information-flow control techniques
Libraries
Metrics
program compilers
program diagnostics
program invariants
program verification
programming
programming language semantics
pubcrawl
Resiliency
Runtime
Runtime system
Scalability
security
security of data
Synchronization
telecommunication security
Theorem Proving
biblio
Black Box to White Box: Discover Model Characteristics Based on Strategic Probing
Submitted by grigby1 on Thu, 03/04/2021 - 2:33pm
black box encryption
composability
Resiliency
Metrics
adversarial attacks
architecture attribution
Black Box Attacks
deep classifier
GPT-2
image based classifiers
image classification
Industries
learning (artificial intelligence)
Libraries
machine learning
model characteristics
Probes
pubcrawl
resilience
security
security of data
strategic probing
text analysis
text generation
text transformer
Training
Training data
tuning
white box
white box adversarial attacks
White Box Security
biblio
An Analysis of Pre-installed Android Software
Submitted by grigby1 on Tue, 02/23/2021 - 2:24pm
Android (operating system)
Android devices
Android ecosystem
Android OS
Android's open source model
Androids
composability
Computer crime
crowd-sourcing methods
data privacy
data-driven services
device manufacturers
device vendors
Ecosystems
Humanoid robots
internet
Libraries
Metrics
Microprogramming
mobile computing
mobile network operators
network accountability
open-source nature
potentially harmful behavior
potentially invasive private data collection practices
pre-installed Android software
pre-installed software
preinstalled apps
preinstalled software
privacy implications
product differentiation
pubcrawl
real-world Android firmware
resilience
Resiliency
security
sensitive data
smart phones
social network platforms
social networking (online)
Software
Supply Chain
tracking services
unwanted behavior
biblio
Identifying Ubiquitious Third-Party Libraries in Compiled Executables Using Annotated and Translated Disassembled Code with Supervised Machine Learning
Submitted by aekwall on Mon, 02/22/2021 - 1:44pm
Software
Task Analysis
Support vector machines
machine learning
pubcrawl
graph theory
internet
tools
Libraries
supply chain management
neural network
Measurement
Databases
reverse engineering
Predictive Metrics
Microprogramming
Classification algorithms
supervised learning
nearest neighbor search
Bayes method
clustering methods
k-nearest neighbor search
Matrices
vector
biblio
SEADer++ v2: Detecting Social Engineering Attacks using Natural Language Processing and Machine Learning
Submitted by aekwall on Mon, 02/22/2021 - 1:38pm
security of data
Scalability
Classification algorithms
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
machine learning
social networking (online)
internet
Libraries
Mathematical model
natural language processing
cyber security
Attack detection
social engineering
blacklisting
Forestry
future attacks
natural language processing steps
potential attacks
SEADer++ v2
social attacks
social engineering attacks detection
social networks potential hackers
biblio
IoT Content Object Security with OSCORE and NDN: A First Experimental Comparison
Submitted by aekwall on Mon, 02/22/2021 - 1:37pm
computer network security
IP networks
Scalability
Internet of Things
Protocols
transport protocols
Resiliency
Human behavior
pubcrawl
Cryptography
internet
Libraries
Logic gates
named data networking
internetworking
ICN
Information Centric Networks
gateways
CoAP
Constrained RESTful Environments
content object security features
content security end-to-end
content transfer
DTLS
DTLS sessions
end-to-end transport
first experimental comparison
information-centric Named Data Networking protocol
IoT content Object Security
large-scale IoT
low power lossy links
measure protocol performances
MQTT-SN
multihop scenarios
NDN attains superior robustness
network experimentation
OSCORE
protocol stacks
protocol translations
proxies
request-response transactions
secure networking
security sessions
single-hop scenarios
1
2
3
4
5
6
7
8
9
next ›
last »