Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Concurrent computing
biblio
A Fast MPEG’s CDVS Implementation for GPU Featured in Mobile Devices
Submitted by grigby1 on Tue, 12/01/2020 - 3:37pm
feature extraction
pubcrawl
Human behavior
Metrics
collaboration
resilience
Resiliency
Scalability
internet
storage management
standards
composability
mobile computing
data structures
multiprocessing systems
parallel processing
Kernel
Policy Based Governance
Mobile handsets
graphics processing units
visualization
mobile devices
image matching
image retrieval
object detection
Services
parallel algorithms
Human Factors
CDVS information
Central Processing Unit
Compact Descriptors for Visual Search
comparable precision
computation times
Computer applications
Concurrent computing
CPU-based reference implementation
descriptor extraction process
embedded software
fast MPEG CDVS implementation
GPU data structures
GPU-based approach
Image analysis
indexing algorithm
Internet-scale visual search applications
interoperable cross-platform solution
main local descriptor extraction pipeline phases
many-cores embedded graphical processor units
matching algorithm
memory access
Moving Picture Experts Group
MPEG CDVS standard
visual descriptors
Internet-scale Computing Security
biblio
CONVUL: An Effective Tool for Detecting Concurrency Vulnerabilities
Submitted by grigby1 on Tue, 10/06/2020 - 1:01pm
Clocks
composability
Concurrency
concurrency control
concurrency vulnerability detection
Concurrent computing
CONVUL
CPS
cyber physical systems
Instruction sets
Instruments
Metrics
multi-threading
multithreaded execution nondeterminism
program diagnostics
pubcrawl
resilience
Resiliency
Runtime
security
security of data
Synchronization
tools
vulnerabilities
biblio
Efficient Modeling of HIL Multi-Grid System for Scalability Concurrency in CPS Security Testbed
Submitted by grigby1 on Tue, 10/06/2020 - 1:01pm
security of data
security
CPS
cyber-physical systems
Metrics
resilience
Resiliency
IEEE standards
Computational modeling
power engineering computing
composability
real-time systems
power grids
IEC standards
SCADA
Scalability
Relays
WAMS
Software systems
Concurrent computing
Phasor measurement units
cyber physical systems
100% realtime performance
Concurrency
coordinated cyber attacks
cyber-event-triggered power grid blackout
cyber-event-triggered power system blackout
cyber-physical system testbeds
grid data streams
hardware-in-the-loop
hardware-in-the-loop CPS security testbeds
HIL CPS security testbed
HIL multigrid system
HIL realtime digital simulator environment
IEEE-118 bus grid model
IEEE-39 bus grid models
industry-grade hardware
interdependent events
large-scale grid models
modular integration designs
Multi-Grid
multigrid isolated models
multitude designs
phasor measurement
physics-constrained recovery
Power and Cyber System Testbed
real-time execution environment
restoration process
synthetic grid model
Ukrainian grid
biblio
SCMiner: Localizing System-Level Concurrency Faults from Large System Call Traces
Submitted by grigby1 on Tue, 10/06/2020 - 1:01pm
composability
Computer bugs
Concurrency
concurrency (computers)
Concurrency Failures
Concurrent computing
CPS
cyber physical systems
Data mining
debugging
default system audit tools
event handlers
failure-inducing system call sequences
fault diagnosis
fault localization
file content
Instruments
interleaving schedule
localizing system-level concurrency faults
Metrics
Multi Process Applications
multiple failing executions
multiple processes
practical online bug diagnosis tool
principal component analysis
Production
production system
program debugging
program diagnostics
program testing
pubcrawl
resilience
Resiliency
scheduling
SCMiner
security
security of data
statistical analysis
statistical anomaly detection techniques
system call traces
System Level
system-level concurrency fault
tools
biblio
Finding Concurrency Exploits on Smart Contracts
Submitted by grigby1 on Tue, 10/06/2020 - 1:00pm
application domains
Bars
blockchain
business data processing
business services
composability
Concurrency
concurrency exploit
concurrency exploits
Concurrent computing
contracts
CPS
Cryptography
cyber physical systems
ethereum
general miner-side type
Metrics
pubcrawl
resilience
Resiliency
security
security attacks
security of data
smart contract
smart contracts
biblio
UFO: Predictive Concurrency Use-After-Free Detection
Submitted by grigby1 on Tue, 12/17/2019 - 11:21am
Browsers
Chromium
common attack vectors
composability
Concurrency
concurrency UAF
concurrency use-after-free detection
Concurrent computing
concurrent programs
critical software systems
cyber-physical system
cyber-physical systems
encoding
extended maximal thread causality model
Instruction sets
larger thread scheduling space
Metrics
multi-threading
multithreaded execution trace
Predictive Metrics
program debugging
program diagnostics
program operating
provably higher detection capability
pubcrawl
rare thread schedules
resilience
Resiliency
Schedules
scheduling
security of data
single observed execution trace
tools
UAF
UAF detection
UAF vulnerabilities
UFO
UFO scales
use-after-free vulnerabilities
vulnerabilities
biblio
OWL: Understanding and Detecting Concurrency Attacks
Submitted by grigby1 on Tue, 12/17/2019 - 11:21am
security
tools
resilience
pubcrawl
Metrics
Resiliency
composability
Linux
public domain software
program debugging
Instruction sets
cyber-physical systems
cyber-physical system
Computer bugs
concurrency control
Concurrent computing
bug-inducing inputs
Concurrency Attack
concurrency attack exploit scripts
concurrency bug detectors
knowledge representation languages
OWL
OWL source code
single-threaded programs
Software Testing
Concurrency
Predictive Metrics
biblio
Concurrency Strategies for Attack Graph Generation
Submitted by grigby1 on Tue, 12/17/2019 - 11:21am
Concurrency
security
attack graph
attack graph generation
attack graphs
composability
Computational modeling
concurrency control
concurrency strategies
Concurrent computing
cyber-physical system
cyber-physical systems
cyberphysical
Generators
graph theory
Instruction sets
large-scale graph
message passing
Metrics
Multi-threaded Programming
network attack graph
network security
network state space
OpenMP
OpenMP-based programming implementation
parallel algorithms
Predictive Metrics
pubcrawl
resilience
Resiliency
Scalability
scalable attack graphs
security of data
storage costs
storage management
telecommunication security
biblio
Detecting Data Races Caused by Inconsistent Lock Protection in Device Drivers
Submitted by grigby1 on Tue, 11/26/2019 - 2:35pm
concurrency control
Concurrent computing
data race
device driver
device drivers
DILP
driver execution
Human behavior
human factor
Human Factors
inconsistent lock protection
Instruments
Kernel
Linux
Linux driver patches
Monitoring
pattern locks
program diagnostics
pubcrawl
resilience
Resiliency
Runtime
runtime analysis
runtime analysis approach
Scalability
biblio
An API Honeypot for DDoS and XSS Analysis
Submitted by grigby1 on Mon, 04/02/2018 - 11:33am
API honeypot
APIs
application program interfaces
attack profiles
Compositionality
Computer crime
computer network security
Concurrent computing
cross-site scripting
cross-site scripting malware insertion
DDoS
distributed denial of service attack
invasive software
malware
pubcrawl
REpresentational State Transfer Application Programming Interface
resilience
Resiliency
Servers
testing
XSS