Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Containers
biblio
The Anomaly Detection Mechanism Using Extreme Learning Machine for Service Function Chaining
Submitted by grigby1 on Tue, 03/30/2021 - 11:54am
5G mobile communication
5g network
Anomaly Detection
Cloud Computing
cloud-native
Containers
extreme learning machine
Extreme learning machines
ICS Anomaly Detection
network function virtualization
Neurons
pubcrawl
resilience
Resiliency
Scalability
service function chaining
service integrity
biblio
Comprehensive Java Metadata Tracking for Attack Detection and Repair
Submitted by grigby1 on Mon, 03/15/2021 - 1:09pm
arrays
command injection attacks
composability
Computer errors
computer security
Containers
Instruments
Intrusion Detection
Java
Libraries
maintenance engineering
metadata
Metrics
pubcrawl
resilience
Resiliency
software safety
biblio
A Human Immunity Inspired Intrusion Detection System to Search for Infections in an Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 2:43pm
Windows operating system
security
Anomaly Detection
artificial immune system
composability
computer security
computer software
Containers
human immunity inspired intrusion detection system
Immune system
Intrusion Detection
intrusion detection system
Metrics
microsoft windows
negative selection algorithm
operating system
operating systems (computers)
pubcrawl
receptors
resilience
Resiliency
security of data
Windows Operating System Security
biblio
Lightweight Testbed for Cybersecurity Experiments in SCADA-based Systems
Submitted by grigby1 on Tue, 02/23/2021 - 2:58pm
ARP Spoofing
computer network security
computer security
container-based SCADA testbed
Containers
critical infrastructure
critical infrastructures
cyber physical systems
cyber-attacks
cybersecurity experiments
Docker
experimental testbeds
financial damages
interoperable platform
learning (artificial intelligence)
machine learning
man in the middle attack
MITM Attack
network classification model
Network reconnaissance
network scanning
network traffic
Open area test sites
pattern classification
physical damages
Protocols
pubcrawl
reconnaissance attack
resilience
Resiliency
SCADA
SCADA systems
SCADA-based Systems
Scalability
telecommunication traffic
testbed
biblio
CRA: Enabling Data-Intensive Applications in Containerized Environments
Submitted by grigby1 on Fri, 12/11/2020 - 3:01pm
Cloud Computing
pubcrawl
resilience
Resiliency
Scalability
metadata
Runtime
Libraries
Containers
Compositionality
computer centres
distributed
data centers
cloud-edge applications
cloud-scale data centers
common runtime for applications
containerization
containerization technologies
Data-Intensive Applications
dataflow processing
Docker
generic dataflow layer
Kubernetes
Kubernetes/Docker
resource orchestration capabilities
Metadata Discovery Problem
biblio
Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments
Submitted by grigby1 on Thu, 10/29/2020 - 11:59am
Ad-hoc Cloud
Cloud Computing
Compositionality
computational devices
computer architecture
computer network security
Containers
edge computing
fog architecture
Fog computing
Internet of Things
Intrusion Detection
IoT
IoT devices
IoT networks
live migrations
manet privacy
MANETs
Metrics
mobile ad-hoc networks
pubcrawl
resilience
Resiliency
security
Task Analysis
untrustworthy IoT environments
VCC
Vehicular cloud
vehicular cloud computing
Virtualization
biblio
PrivAnalyzer: Measuring the Efficacy of Linux Privilege Use
Submitted by aekwall on Mon, 10/26/2020 - 11:46am
security
security of data
Access Control
Program processors
Linux
Resiliency
pubcrawl
composability
Metrics
tools
Analytical models
Containers
program diagnostics
Predictive Metrics
program compilers
formal verification
static analysis
verification
dynamic analysis
operating systems
AutoPriv
ChronoPriv
Linux privilege use
Linux privileges
LLVM-based C/C++ compiler
PrivAnalyzer
privilege escalation attacks
privileged open source programs
ROSA model checker
term rewriting
Linux Operating System Security
biblio
Adding Custom Sandbox Profiles to iOS Apps
Submitted by aekwall on Mon, 09/21/2020 - 3:47pm
security of data
Access Control
Kernel
mobile computing
system monitoring
Resiliency
pubcrawl
composability
privacy
cyber-physical systems
Containers
smart phones
Mobile communication
mobile devices
ios
attack prevention mechanisms
confinement architecture
containment principle
custom sandbox profiles
third party application
confinement
biblio
Sandnet: Towards High Quality of Deception in Container-Based Microservice Architectures
Submitted by aekwall on Mon, 09/21/2020 - 3:46pm
computer network security
security
system monitoring
Resiliency
pubcrawl
composability
Production
privacy
threat intelligence
Measurement
sandboxing
cyber-physical systems
Containers
computer viruses
Switches
Degradation
Attack Strategies
Cloning
container-based microservice architectures
evaluation scenario
live confinement
network deception mechanisms
open production network
Production systems
QoD
quarantined services
sandbox network
sandnet
security incidents
suspicious microservices
vulnerable production network
confinement
biblio
Efficiency Assessment of the Steganographic Coding Method with Indirect Integration of Critical Information
Submitted by grigby1 on Fri, 09/18/2020 - 1:47pm
Comparative Analysis
security
pubcrawl
resilience
Resiliency
matrix algebra
Cryptography
Containers
Metrics
Compositionality
visualization
Image coding
Image reconstruction
Steganography
distortion
coding theory
built-in containers
code structures
container.
critical information
data extraction
digital data container
digital platform
digital representation
digital video data platform
Discrete Cosine Transformation (DCT)
discrete cosine transformation matrix
discrete cosine transforms
efficiency assessment
embedded critical data
embedded data resistance
embedded digital data
encoding embedding
image container
image fragment
image media image
Koch methods
Lakes
quantization coefficient
steganographic coding
steganographic coding method
steganographic embedding
structural elements
transformed image
weight coefficients
Zhao methods
1
2
3
4
next ›
last »