Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
software packages
biblio
Future edge clouds
Submitted by aekwall on Mon, 11/30/2020 - 11:04am
Cloud Computing
Servers
Hardware
Resiliency
Human behavior
pubcrawl
composability
Metrics
Software systems
Virtualization
policy governance
software packages
Internet-scale Computing Security
biblio
Dangers and Prevalence of Unprotected Web Fonts
Submitted by grigby1 on Fri, 04/17/2020 - 9:46am
attack surface
CDNs
composability
Compositionality
cryptographic fingerprints verification
Cryptography
fingerprint identification
fonts
Google
Human behavior
Human Factors
integrity
internet
malicious font
malicious script
maliciously modified version
Metrics
online front-ends
pubcrawl
resilience
Resiliency
security-conscious users
software package
software packages
software vendors
SRI support
stylesheets
subresource integrity mechanism
unprotected Web fonts
Web
Web Browser Security
Web sites
biblio
Modeling of quantum channel parameters impact on information exchange security
Submitted by grigby1 on Mon, 01/21/2019 - 11:39am
adversary
Adversary Models
attack on the protocol
attenuation
authorisation
C++ language
cryptanalysis
cryptographic security
Cryptography
Human behavior
information exchange security
information security
Metrics
Photonics
photons
Polarization
Protocols
pubcrawl
Qt Creator C++ program package
quantum channel imperfections
quantum channel parameters impact modeling
quantum communication channel
quantum computer
quantum computing
quantum computing security
quantum information exchange computer emulator
Quantum Key Distribution
Resiliency
Scalability
software packages
unauthorized access
biblio
Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks
Submitted by grigby1 on Wed, 07/18/2018 - 9:05am
Anomaly Detection
baseline signature database
Bloom filter
Bloom filters
communication patterns
control engineering computing
data structures
database management systems
Databases
Detectors
digital signatures
field devices
gas pipeline SCADA system
ICS Anomaly Detection
ICS networks
industrial control
Industrial Control Systems
integrated circuits
Intrusion Detection
learning (artificial intelligence)
long short term memory networks
LSTM networks
multilevel anomaly detection method
network package content analysis
package content level anomaly detection
package signatures
package traffic
pattern classification
production engineering computing
Protocols
pubcrawl
recurrent neural nets
resilience
Resiliency
SCADA systems
Scalability
signature database
software packages
stacked long short term memory network-based softmax classifier
time series
time-series anomaly detection
time-series structure
biblio
Verification and Validation of a Cyber-Physical System in the Automotive Domain
Submitted by grigby1 on Thu, 06/07/2018 - 2:08pm
formal verification
security
cyber-physical systems
pubcrawl
Scalability
software quality
Analytical models
Wheels
delays
Stochastic processes
traffic engineering computing
Cameras
resilience
probability
CPS
embedded systems
Automotive engineering
Resiliency
quality assurance
power aware computing
software development
Stochastic computing
autonomous traffic sign recognition vehicle
cyber-physical system validation
cyber-physical system verification
domain specific architectural language
EAST-ADL
EAST-ADL constraints
EAST-ADL/Stateflow
energy constraints
extended ERT constraints
formal statistical analysis
functional quality assurance
mapping rules
modified EAST-ADL
nonfunctional quality assurance
parallel languages
probabilistic extension
probability parameters
S/S models
safety-critical automotive embedded system design
semantics denotation
Simulink Design Verifier
Simulink/Stateflow integration
software packages
transformed energy-aware real-time behaviors
UPPAAL models
UPPAAL-SMC
verifiable UPPAAL- SMC models
Verification & Validation
Stochastic Computing Security
biblio
Source File Set Search for Clone-and-Own Reuse Analysis
Submitted by K_Hooper on Wed, 12/20/2017 - 10:31am
Android (operating system)
Android source code
b-bit minwise hashing technique
clone-and-own reuse analysis
Cloning
component extraction
Cryptography
Data mining
Debian GNU package
Debian Linux package
directory names
efficient file similarity computation
file clone detection
Firefox source code
Information Reuse
origin analysis
pubcrawl
Resiliency
security
security vulnerabilities
SHA-1 file hash
Software
software ecosystem
software packages
software reusability
Software reuse
source code repositories
source code reuse
source code search
source code (software)
source files
source file set search
version control system
biblio
Columbus: Filesystem Tree Introspection for Software Discovery
Submitted by grigby1 on Tue, 12/12/2017 - 12:19pm
agile development practices
cloud
Cloud Computing
Columbus
Compositionality
data structures
Docker Images
drift detection situations
feature extraction
file metadata
filesystem tree introspection
learning (artificial intelligence)
licensing requirement compliance
machine learning methods
meta data
metadata
Metadata Discovery Problem
Operational analytics
Packaging
problem diagnosis
program diagnostics
pubcrawl
querying package management tools
Resiliency
Scalability
software discovery
software engineering
software management
software packages
software packaging knowledge
standards
tools
biblio
Mobile banking and information security risks: Demand-side predilections of South African lead-users
Submitted by grigby1 on Mon, 02/27/2017 - 11:54am
Banking
Context
data analysis
Data collection
demand-side predilections
Gauteng province
Human Factors
information security
information security risk
information security risks
Lead
Lead-users
Mobile banking
mobile banking services
mobile commerce
Mobile communication
Predilections
pubcrawl170107
pubcrawl170108
quantitative approach
security of data
software package
software packages
South African lead-users
TAM
theory-of-perceived risk
theory-of-technology acceptance model
Tinker
tinkering process
TPP
UCON
usage control theory