Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
codes
biblio
Design and Analysis of Hash Algorithm Using Autonomous Initial Value Proposed Secure Hash Algorithm64
Submitted by grigby1 on Thu, 06/09/2022 - 2:39pm
pubcrawl
resilience
Cryptography
Memory management
complexity
Compositionality
Input variables
Hash functions
hash algorithms
smart cards
Focusing
SHA
Resiliency
codes
One-way Function
passwords
biblio
Adversarial Machine Learning for Enhanced Spread Spectrum Communications
Submitted by grigby1 on Thu, 06/09/2022 - 2:32pm
military communication
DSSS
Human Factors
codes
radio transmitters
adversarial learning
iobt
Internet of Battlefield Things (IoBT)
spread spectrum communication
deep learning
Gold
Scalability
performance evaluation
Resiliency
resilience
pubcrawl
IoT
biblio
GNN4IP: Graph Neural Network for Hardware Intellectual Property Piracy Detection
Submitted by grigby1 on Wed, 06/08/2022 - 10:20am
Logic gates
pubcrawl
policy-based governance
resilience
Resiliency
Hardware
composability
intellectual property
Watermarking
supply chains
intellectual property security
codes
Globalization
biblio
An Intellectual Property Data Access Control Method for Crowdsourced Testing System
Submitted by grigby1 on Wed, 06/08/2022 - 10:19am
Access Control
data access control
crowdsourced testing
blockchains
codes
intellectual property security
attribute-based encryption
blockchain
composability
encryption
data privacy
privacy
intellectual property
Resiliency
resilience
policy-based governance
pubcrawl
biblio
Research on Key Technology of Software Intellectual Property Protection
Submitted by grigby1 on Wed, 06/08/2022 - 10:19am
pubcrawl
policy-based governance
resilience
Resiliency
Heuristic algorithms
composability
Java
Software algorithms
reverse engineering
intellectual property
software protection
intellectual property security
obfuscation
codes
software intellectual property protection
SOPM
biblio
Foraging-Theoretic Tool Composition: An Empirical Study on Vulnerability Discovery
Submitted by grigby1 on Mon, 06/06/2022 - 12:11pm
empirical study
Information Reuse
tool design patterns
profitability
Information foraging theory
design science
Costs
codes
data science
tools
Design methodology
vulnerability discovery
Compositionality
Software
Resiliency
pubcrawl
security
biblio
Software Reuse Exploits in Node.js Web Apps
Submitted by grigby1 on Mon, 06/06/2022 - 12:10pm
security
Servers
pubcrawl
Resiliency
Safety
Ecosystems
Manuals
data flow analysis
Compositionality
code injection attacks
code reuse attacks
Inspection
codes
application-level DoS
private data leaks
Information Reuse
biblio
Finding Runtime Usable Gadgets: On the Security of Return Address Authentication
Submitted by grigby1 on Mon, 06/06/2022 - 12:09pm
security
pubcrawl
Resiliency
message authentication
authentication
Runtime
Compositionality
memory security
codes
Return address authentication
reuse attack
Information Reuse
biblio
AddrArmor: An Address-based Runtime Code-reuse Attack Mitigation for Shared Objects at the Binary-level
Submitted by grigby1 on Mon, 06/06/2022 - 12:09pm
security
pubcrawl
Resiliency
Hardware
Instruments
Runtime
Compositionality
Performance analysis
Loading
codes
code-reuse attack
instrumentation
Information Reuse
biblio
Using Counterfactual Regret Minimization and Monte Carlo Tree Search for Cybersecurity Threats
Submitted by grigby1 on Fri, 05/20/2022 - 3:45pm
Nash Equilibrium
threat mitigation
MCTS
incomplete information games
extensive form games
counterfactual regret minimization
CFR
Sea measurements
codes
Minimization
Computer hacking
Monte Carlo methods
Metrics
Games
Resiliency
resilience
Human behavior
pubcrawl
Predictive models
1
2
3
4
5
6
7
next ›
last »