Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Policy-Governed systems
biblio
Dragon Architect: Open Design Problems for Guided Learning in a Creative Computational Thinking Sandbox Game
Submitted by
grigby1
on Wed, 05/09/2018 - 1:54pm
collaboration
composability
computational thinking
game-based learning
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
programming education
pubcrawl
sandboxing
biblio
Sandcrust: Automatic Sandboxing of Unsafe Components in Rust
Submitted by
grigby1
on Wed, 05/09/2018 - 1:54pm
collaboration
composability
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
pubcrawl
sandboxing
biblio
Session Based Behavioral Clustering in Open World Sandbox Game TUG
Submitted by
grigby1
on Wed, 05/09/2018 - 1:54pm
clustering
collaboration
composability
Data mining
open world sandbox games
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
pubcrawl
sandboxing
user behavioral clustering
biblio
IoT Sandbox: To Analysis IoT Malware Zollard
Submitted by
grigby1
on Wed, 05/09/2018 - 1:54pm
collaboration
composability
IoT
malware
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
pubcrawl
sandbox
sandboxing
biblio
Synthesis of Hardware Sandboxes for Trojan Mitigation in Systems on Chip
Submitted by
grigby1
on Wed, 05/09/2018 - 1:54pm
automata
automata theory
automatic generation
behavioral checkers
behavioral properties
CAPSL
collaboration
component authentication process
components off the shelf
composability
computer science
Computers
COTS
design flow
Hardware
hardware sandboxes
interface automata
invasive software
IP security
nontrusted IP
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
property specification language SERE
pubcrawl
run-time verification techniques
sandboxed layouts
sandboxing
security
sequential extended regular expressions
SoC
system-on-chip
Trojan horses
Trojan mitigation
trusted system-on-chips
virtualized controllers
virtualized resources
biblio
Identifying Email Threats Using Predictive Analysis
Submitted by
grigby1
on Wed, 05/09/2018 - 1:54pm
Analytical models
attackers
collaboration
composability
Computer crime
Electronic mail
email threat identification
feature extraction
invasive software
learning (artificial intelligence)
machine learning algorithms
machine learning model
malicious emails
malware
malware attachment
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
predictive analysis approach
Predictive models
pubcrawl
Random Forest
sandboxing
static analysis
Support vector machines
targeted attacks
Uniform resource locators
unseen emails
unsolicited e-mail
URL
biblio
Towards Proactive SDN-Controller Attack and Failure Resilience
Submitted by
grigby1
on Wed, 05/09/2018 - 1:53pm
central SDN controller
checkpointing
collaboration
composability
computer network performance evaluation
computer network security
Containers
control systems
controller resilience
controller sandboxing mechanism
controller/host isolation
data center networks
failure resilience
failure-and-attack-resilient execution
generic hardware platforms
host-based attacks
Linux
Linux containers
Linux-containers
live remote checkpointing
moving-target defense
network performance
PAFR
plug-and-play operation
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
proactive SDN-controller attack
pubcrawl
resilience
sandboxing
SDN networks
security
Servers
software defined modules
software defined networking
Software-Defined Networks
Virtualization
biblio
Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security
Submitted by
grigby1
on Wed, 05/09/2018 - 1:53pm
Cloud Computing
cloud environment
Cloud Security
cloud-computing technology
collaboration
composability
computer architecture
cost services
Dynamic Malware Analysis
Honeypot Network
honeypot networks
Intrusion Detection
invasive software
malicious attacks
malware
Malware Analysis
network intrusion detection system
network intrusion detection systems
NIDS module
openstack
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
Ports (Computers)
pubcrawl
sandboxing
sandboxing environment
Servers
Signature-based detection
Snort
biblio
RansHunt: A Support Vector Machines Based Ransomware Analysis Framework with Integrated Feature Set
Submitted by
grigby1
on Wed, 05/09/2018 - 1:53pm
Algorithm design and analysis
collaboration
composability
crypto-ransomwares
Cryptography
cyber-crime
dynamic analysis
Electronic mail
feature extraction
Heuristic algorithms
hybrid cryptosystem
individual analysis approach
integrated feature set
invasive software
learning (artificial intelligence)
machine learning
malware
malwares
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
pubcrawl
RansHunt
Ransomware
ransomware analysis framework
ransomware families
ransomware samples
ransomware variants
sandboxing
static analysis
static code features
static features
Support vector machines
biblio
Fine-Grained Supervision and Restriction of Biomedical Applications in Linux Containers
Submitted by
grigby1
on Wed, 05/09/2018 - 1:53pm
algorithm development
application analysis
biomedical application restriction
biomedical data
Cloud Computing
collaboration
complex programs
composability
container portability
Containers
data analysis
distributed processing
docker-based container
external code repositories
fine-grained restricted environment
fine-grained supervision
Kernel
Linux
Linux containers
medical administrative data processing
medical data processing
Monitoring
multidimensional biosignal recordings normalization
operating system
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
Process Supervision
program libraries
pubcrawl
sandbox
sandboxing
security
security of data
security technologies
system call filtering
System Call Interception