Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
security principles
biblio
Designing Secure and Resilient Embedded Avionics Systems
Submitted by
aekwall
on Wed, 05/01/2019 - 11:41am
aerospace computing
Aerospace electronics
avionics
avionics community
avionics domains
composability
computer architecture
cyber resources
cyber security principles
embedded systems
Laboratories
Metrics
Program processors
pubcrawl
real-time systems
Resiliency
resilient embedded avionics systems
Safety
safety oriented principles
security
security of data
security principles
UAS
unmanned aerial systems
biblio
A classification methodology for security patterns to help fix software weaknesses
Submitted by
grigby1
on Mon, 11/20/2017 - 11:22am
authentication
authorization
classification
classification semiautomatic methodology
collaboration
Databases
fault tolerance
Fault tolerant systems
Governance
Government
Human behavior
internet
Metrics
pattern choice
pattern classification
Policy
policy-based governance
pubcrawl
Resiliency
security of data
security patterns
security principles
security principles hierarchical organization
Security weakness
security weaknesses
Software
software life
software weakness
software weakness fixing
web applications
biblio
Wifi authentication through social networks #x2014; A decentralized and context-aware approach
Submitted by
BrandonB
on Mon, 05/04/2015 - 1:48pm
authentication
authentication mechanism
authorisation
authorization
context-aware approach
decentralized approach
EAP-SocTLS
EAP-TLS
embedded trust relations
heuristic
IEEE 802.11 Standards
message authentication
password
physical proximity
Probes
Protocols
quadratic search complexity
search problems
search time reduction
security principles
Servers
smartphone
Social Devices
Social network services
social networking (online)
social networks
telecommunication security
Trusted Computing
ubiquitous computing
WebID
WiFi authentication
WiFi Authentication and Authorization
WiFi router
WiFi-enabled devices
wireless LAN