Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
formal verification
biblio
A Solution of Text Based CAPTCHA without Network Flow Consumption
Submitted by grigby1 on Thu, 03/18/2021 - 2:35pm
authorisation
CAPTCHA technology
captchas
client
client malicious programs
client-server systems
composability
distributed information processing
encryption
formal verification
high-security text-based CAPTCHA solution
Human behavior
information processing
information processing security issues
network flow
pubcrawl
security
security risks
server
Servers
software engineering
telecommunication traffic
text based CAPTCHA
text-based CAPTCHA
verification logic
biblio
InFoCPS: Integrating Formal Analysis of Cyber-Physical Systems with Energy Prognostics
Submitted by grigby1 on Tue, 02/16/2021 - 1:40pm
cyber-physical systems
pubcrawl
resilience
Resiliency
formal verification
power aware computing
Energy storage
CPS development processes
dynamic energy behaviors
electric batteries
energy constraints
energy prognostics
energy uncertainty
formal analysis
formal analysis techniques
InFoCPS PhD research project
PHM techniques
prognostics and health management
trustworthy CPS
Damage Assessment
biblio
A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 2:03pm
anonymity
authentication
authorisation
AVISPA
biometrics
biometrics (access control)
biometrics based key agreement
composability
diseases
e-health
e-health systems
ECG
file servers
formal security verification tool AVISPA
formal verification
health care
health systems
healthcare services
Human behavior
medical information systems
medical servers
Medical services
message authentication
Metrics
password
pubcrawl
remote monitoring
resilience
Resiliency
Servers
Smart card
smart cards
telecare medical information systems
telemedicine
three factor user authentication
Three-factor authentication
TMIS
user anonymity
user/server communication security
biblio
A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks
Submitted by aekwall on Mon, 01/25/2021 - 1:03pm
security
computer network security
Internet of Things
Internet of Things (IoT)
computer architecture
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
composability
graph theory
Computational modeling
tools
computer networks
model checking
data visualisation
visualization
Predictive Metrics
formal verification
Internet of Things systems
SCADA networks
networked system
cyber-physical systems security
attack graphs
A2G2V algorithm
architecture description tool
atomic-level vulnerabilities
attack graph
automatic attack graph generation
control networks
Cyber-Physical Systems (CPS)
enumerating counterexamples
model-checking tools
model-checking-based automated attack graph generator and visualizer
visualization tool
biblio
Efficient Verification of Neural Networks via Dependency Analysis
Submitted by yogeshvu on Wed, 01/20/2021 - 6:53pm
formal verification
local adversarial robustness
Neural networks
biblio
IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform
Submitted by grigby1 on Wed, 01/20/2021 - 4:22pm
API
API test cases
API unauthorized access vulnerability detection
APIs
application program interfaces
application programming interface
authorisation
cloud API
Cloud Computing
cloud services
Compositionality
data privacy
formal verification
Internet of Things
IoT devices
IoT security
IoT-APIScanner
permission verification
program testing
pubcrawl
resilience
Resiliency
security
Smart homes
Task Analysis
timing
tools
unauthorized access
user privacy
Web API
biblio
Checking Security Properties of Cloud Service REST APIs
Submitted by grigby1 on Wed, 01/20/2021 - 4:19pm
active property checkers
API
APIs
application program interfaces
application programming interface
capture desirable properties
checking security properties
Cloud and Web services
Cloud Computing
cloud service REST
Compositionality
Computer bugs
formal verification
fuzzing
modern cloud
Office365 cloud services
Production
pubcrawl
rendering (computer graphics)
resilience
Resiliency
REST APIs
security
security of data
security rules
stateful REST API fuzzer
test generation
web services
biblio
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation
Submitted by aekwall on Mon, 12/07/2020 - 12:25pm
Analytical models
authentication
composability
Cryptographic Protocols
cryptographic scheme
cyber-physical system security
digital signatures
direct anonymous attestation
ECC-based direct anonymous attestation
ECC-based version
ECC-DAA
expected authentication
formal analysis
formal verification
IEC standards
ISO standards
mechanised analysis
neural style transfer
Predictive Metrics
privacy
pubcrawl
public key cryptography
Resiliency
Scalability
secrecy
secrecy properties
symbol manipulation
symbolic analysis
symbolic verification
Tamarin modelling
Tamarin prover
tpm
Trusted Computing
trusted platform module TPM-backed anonymous credentials
trusted platform modules
profile
Luan Nguyen
CPS Domains
CPS Technologies
Education
Foundations
Science Policy
Research Program Overview
formal verification
Safe Autonomy
Secure Information Flow Analysis
hybrid systems
cyber-physical systems
Ohio
biblio
Requirements Patterns Structure for Specifying and Reusing Software Product Line Requirements
Submitted by aekwall on Mon, 11/09/2020 - 1:14pm
security
Software
Resiliency
pubcrawl
Unified modeling language
Formal Specification
Proposals
Compositionality
formal verification
Systematics
documentation
systems analysis
RePa requirements pattern template
requirement engineering activities
Requirements Patterns
requirements patterns structure
Requirements Reuse
software artifacts
software development phases
Software Product Line Engineering
software product line requirements
software product lines
software requirement pattern structure
SPLE
SRP structure
Information Reuse and Security
1
2
3
4
5
6
7
8
9
…
next ›
last »