Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
security vulnerabilities
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 1:55pm
adversarial reconnaissance
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
data privacy
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
Network reconnaissance
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
security of data
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
biblio
Cookies in a Cross-site scripting: Type, Utilization, Detection, Protection and Remediation
Submitted by grigby1 on Wed, 02/10/2021 - 12:20pm
Cryptography
encryption
security of data
pubcrawl
Human behavior
resilience
Resiliency
Scalability
internet
Data protection
security vulnerabilities
Artificial Intelligence
Browsers
web applications
classification
cross-site scripting
artificial intelligence techniques
Cisco 2018
cookies
mitigation
protection
spyware
XSS
Cross Site Scripting
biblio
ROSploit: Cybersecurity Tool for ROS
Submitted by grigby1 on Thu, 12/17/2020 - 12:37pm
Analytical models
Biological system modeling
control engineering computing
Cybersecurity
cybersecurity tool
foundational knowledge
Human behavior
Human Factors
modular two-pronged offensive tool
offensive tool
operating systems
operating systems (computers)
policy-based governance
preliminary state
pubcrawl
public domain software
Reconnaissance
resilience
Resiliency
robot operating systems
robot programming
robotic operating system security research
robotic systems
robotics
robots
ROS
ROS systems
ROSploit
security
security of data
security vulnerabilities
threat model
tools
biblio
Trustworthiness Assessment of Web Applications: Approach and Experimental Study using Input Validation Coding Practices
Submitted by aekwall on Mon, 12/07/2020 - 11:30am
Assessment
assessment techniques
coding practices
composability
feasible security practices results
input validation coding practices
input validation practices
internet
pubcrawl
quality model
secure code
security of data
security perspective
security vulnerabilities
software quality
software security
trustworthiness
trustworthiness assessment
vulnerabilities
Web application
web applications
biblio
Crypto trust point (cTp) for secure data sharing among intelligent vehicles
Submitted by aekwall on Mon, 11/23/2020 - 10:22am
traffic engineering computing
Scalability
Cryptography
telecommunication security
security
Resiliency
pubcrawl
vehicular ad hoc networks
blockchain
trust
Distributed databases
Reliability
security vulnerabilities
Compositionality
data accuracy
secure data
Insurance
communication data
communication channel
crypto trust point
CTP
illegitimate vehicles behavior
information communication
Intelligent vehicle technology
Intelligent vehicles
intelligent vehicles communication
IV communication
IV data security
IVs communication environment
legitimate vehicles behavior
rewarding thereby building trust
successful communication
Traditional Security approaches
Trust point mechanism
Vehicle communication
Intelligent Data Security
Intelligent Data and Security
biblio
Security Requirements for Cloud-based C4I Security Architecture
Submitted by grigby1 on Fri, 11/20/2020 - 1:25pm
Cloud Computing
cloud computing system
cloud computing technology
cloud-based C4I security architecture
Cloud-based C4I Security Requirements
command and control systems
computer security
Information systems
Korea Military
Korea national defense information system
military computing
national defense command control system
national innovation
policy-based governance
pubcrawl
public sector
secure security architecture
security of data
Security Policies Analysis
security requirements
security vulnerabilities
Servers
Task Analysis
US military
biblio
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development
Submitted by grigby1 on Tue, 11/17/2020 - 1:41pm
security of data
security
pubcrawl
Metrics
Resiliency
data integrity
security threats
composability
mobile computing
smart phones
malware
software development management
software engineering
security vulnerabilities
SDLC
risk analysis
resilience
testing
Detectors
Mobile Applications
Banking
Android (operating system)
security holes
information confidentiality
access sensitive information
Android development
data leaks
defensive requirements analysis
development lifecycle
development stage
guided security requirement analysis
Mobile Apps
mobile apps flaws
mobile software engineers
necessary security knowledge
OWASP
OWASP mobile top ten risks
OWASP risk analysis driven security requirements specification
secure Android mobile software development
secure mobile SDLC
secure mobile software development education
security defects open doors
security requirements
software developers
useful mobile security guidelines
Operating systems security
biblio
Security Vulnerabilities in Handover Authentication Mechanism of 5G Network
Submitted by aekwall on Mon, 11/16/2020 - 1:50pm
3GPP
5G communication network
5G handover
5G handover key mechanism
5G handover security analysis
5G mobile communication
5g network
authentication
authentication complexity
communication entities
computer architecture
Fifth Generation mobile telecommunication technology
Handover
handover architecture
handover key mechanism
handover mechanism
inter-gNB handover
inter-gNB handover authentication mechanism
Internet of Things
IoT-based applications
key hierarchy
key resilience problem
message authentication
mobility management (mobile radio)
pre-authentication
pubcrawl
Resiliency
Resilient Security Architectures
secret keys
security counter-measures
security demands
security issues
security vulnerabilities
Security weakness
telecommunication security
Third Generation Partnership Project
biblio
Compliance Checking of Open Source EHR Applications for HIPAA and ONC Security and Privacy Requirements
Submitted by aekwall on Mon, 11/09/2020 - 12:20pm
security of data
Servers
data privacy
electronic health records
Medical services
security
Resiliency
pubcrawl
privacy
tools
open source tools
static analysis
security vulnerabilities
health care
security issues
Compositionality
certification
adopted EHR application
certification compliance
clinic visits
compliance checking
convenient access
digital versions
EHR applications
Electronic Health Record applications
Health Information Technology certification criteria
Health Insurance Portability
HIPAA Compliance
HIPAA technical requirements
ONC certification
ONC criteria
open source EHR applications
OpenEMR
paper-based patient
patient medication
patient treatment plans
precise medical decision-making process
privacy criteria
Privacy Requirements
regulatory requirements
security risks
static code analysis-based vulnerability
Information Reuse and Security
biblio
Using Software Metrics for Predicting Vulnerable Code-Components: A Study on Java and Python Open Source Projects
Submitted by aekwall on Mon, 11/02/2020 - 1:46pm
code component
code-component
Java
Java projects
Java vulnerable functions
learning (artificial intelligence)
machine learning
Measurement
metrics testing
Metrics
pubcrawl
public domain software
Python
Python open source projects
Python vulnerable function prediction
safety-critical software
security
security of data
security vulnerabilities
software metrics
software metrics-based vulnerability prediction
software projects
software reliability
software security
testing
Vulnerability prediction
vulnerability prediction performance
vulnerability predictors
1
2
3
4
5
6
next ›
last »