Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Software
biblio
A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures
Submitted by
aekwall
on Mon, 12/02/2019 - 11:08am
security of data
Scalability
security
Software
Resiliency
pubcrawl
Metrics
Measurement
Software Architecture
Indexes
Logic gates
risk analysis
business data processing
Security Metrics
moving target defense
Compositionality
program compilers
Application Container Security
automatic code generation techniques
business capabilities
cyber risk
diversification index
economics-of-scale incentives
microservice architectures structure
microservices attack surfaces
Microservices Security
moving target defense mechanism
MSA
multistep attacks
security risk assessment
security risk-oriented software diversification
Transforms
compiler security
biblio
SoK: Shining Light on Shadow Stacks
Submitted by
aekwall
on Mon, 12/02/2019 - 11:08am
security of data
Scalability
security
Software
Resiliency
pubcrawl
Metrics
optimization
metadata
program diagnostics
Payloads
Compositionality
Registers
program compilers
defense mechanisms
backward edge
C++ languages
CFI mitigations
compatibility
compiler designers
control-flow hijacking attacks
control-flow integrity solutions
control-flow-hijacking
control-flow-integrity
deployed mitigations
dominant attack vector
forward edge
fully precise mechanism
indirect calls
language-based-security
low performance overhead
Memory Protection
performance comparisons
return-oriented-programming
shadow stack design
shadow stacks
shadow-stacks
software security mitigations
virtual calls
compiler security
biblio
Understand Code Style: Efficient CNN-Based Compiler Optimization Recognition System
Submitted by
aekwall
on Mon, 12/02/2019 - 11:07am
security of data
Scalability
security
Software
Task Analysis
Resiliency
pubcrawl
Metrics
optimization
convolutional neural nets
Analytical models
convolution
recurrent neural nets
Semantics
Compositionality
binary file processing
binary security analysis
closed source compilers
CNN-based compiler optimization level recognition model
CNN-based compiler optimization recognition system
compiler optimization algorithms
optimising compilers
RNN-based model
understand code style
compiler security
biblio
SENAD: Securing Network Application Deployment in Software Defined Networks
Submitted by
aekwall
on Mon, 12/02/2019 - 11:04am
computer network security
Access Control
authorisation
authorization
Runtime
Software
computer architecture
computer network management
software defined networking
Resiliency
pubcrawl
composability
Metrics
SDN controller
process control
network management
command injection attacks
APC
app-to-control threats
application plane controller
Computer crashes
data plane controller
DPC
dubbed SENAD
malicious command injection
network application deployment
network programmability
OpenFlow entries
resource exhaustion attack
resource isolation
SDN architecture
Software Defined Networks
telecommunication control
telecommunication network management
biblio
Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid
Submitted by
aekwall
on Mon, 12/02/2019 - 11:04am
security of data
computer network security
intrusion detection system
IP networks
security
Software
real-time systems
Resiliency
pubcrawl
composability
Global Positioning System
malicious activities
Metrics
standards
Decision Making
Phasor measurement units
smart power grids
Smart Grid
power engineering computing
command injection attacks
aforementioned cyber-attacks
attack capabilities
command injection attack
Cyber-physical attacks
decentralized decision making capability
defense mechanisms
IEEE standards
packet drop attack
phasor measurement
potential physical impacts
stealthy cyber-attacks
stealthy data manipulation attack
stealthy man-in-the-middle attacks
synchrophasor communication standard
synchrophasor devices
synchrophasor network security
synchrophasor technology
synchrophasor-based synchronous islanding testbed
synchrophasor-based systems
biblio
Secure IoT for a Pervasive Platform
Submitted by
grigby1
on Tue, 11/26/2019 - 2:42pm
computer architecture
computer network security
end-to-end security level
Hardware
Human behavior
human factor
Human Factors
Internet of Things
Metrics
pervasive applications
pervasive computing
Pervasive Computing Security
pervasive platform
pervasive systems
pubcrawl
Public key
public key cryptography
public key infrastructure
resilience
Resiliency
Scalability
secure element
secure IoT
security
Servers
smart communication-enable devices
Software
software elements
ubiquitous computing
biblio
An Evaluation of the Security of the Bitcoin Peer-To-Peer Network
Submitted by
grigby1
on Tue, 11/26/2019 - 2:38pm
bitcoin
bitcoin core software
bitcoin message exchanges
bitcoin mining process
Bitcoin peer-to-peer network
blockchain
Computer crime
computer network security
cryptocurrencies
Cryptographic Protocols
Data mining
DDoS Attacks
denial of service
distributed denial of service attacks
Human behavior
human factor
Human Factors
Metrics
network message exchanges
network protocol
P2P network
peer to peer security
Peer-to-peer computing
Protocols
pubcrawl
resilience
Resiliency
Scalability
Security Evaluation
service attacks
Software
transaction confirmation process
file
Comparing Traditional Machine Learning and Deep Learning Approaches for Security Vetting of Android Apps
Submitted by
xinmingou
on Mon, 11/25/2019 - 12:04pm. Contributors:
Xinming Ou
Doina Caragea
Sankardas Roy
Guojun Liu
Emily Alfs
Dewan Chaulagain
Software
SaTC PI Meeting 2019
2019
Poster
NSF
U.S. Government
1717862
1717871
1718214
Posters
biblio
Formal Verification Technology for Asynchronous Communication Protocol
Submitted by
grigby1
on Tue, 11/12/2019 - 3:29pm
aerospace FPGA software products
assert
asynchronous communication
asynchronous communication protocol
blind spots
Clocks
collaboration
complete verification process
composability
Compositionality
field programmable gate arrays
formal verification
formal verification technology
policy-based governance
privacy
process control
Product design
product design quality
property
protocol verification
Protocols
PSL
pubcrawl
Software
traditional simulation method
UART communication
verification work efficiency
biblio
Cross-Entropy: A New Metric for Software Defect Prediction
Submitted by
grigby1
on Tue, 11/12/2019 - 3:26pm
code metric
code naturalness
Computer bugs
cross-entropy
deep learning
DefectLearner
Entropy
language model
Measurement
Metrics
natural language processing
Predictive models
predictive security metrics
program debugging
pubcrawl
recurrent neural nets
recurrent neural network language model
Semantics
Software
software bugs
software defect prediction
software metrics
software quality
software quality assurance
software repository
source code
source code (software)
Task Analysis
1
2
3
4
5
6
7
8
9
…
next ›
last »