Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
security
biblio
IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform
Submitted by
grigby1
on Wed, 01/20/2021 - 3:22pm
API
API test cases
API unauthorized access vulnerability detection
APIs
application program interfaces
application programming interface
authorisation
cloud API
Cloud Computing
cloud services
Compositionality
data privacy
formal verification
Internet of Things
IoT devices
IoT security
IoT-APIScanner
permission verification
program testing
pubcrawl
resilience
Resiliency
security
Smart homes
Task Analysis
timing
tools
unauthorized access
user privacy
Web API
biblio
An Analysis of Utility for API Recommendation: Do the Matched Results Have the Same Efforts?
Submitted by
grigby1
on Wed, 01/20/2021 - 3:22pm
security
pubcrawl
resilience
Resiliency
Conferences
programming
APIs
API
Compositionality
software reliability
evaluation
Current measurement
software quality
application programming interface
Reliability engineering
API Recommendation
correctness
term frequency
utility
biblio
CryptoExplorer: An Interactive Web Platform Supporting Secure Use of Cryptography APIs
Submitted by
grigby1
on Wed, 01/20/2021 - 3:20pm
Cryptography
Data mining
pubcrawl
resilience
Resiliency
security
internet
APIs
application program interfaces
API
software engineering
Java
Compositionality
interactive systems
application programming interface
code analysis
CryptoExplorer
cryptographic APIs
interactive Web platform
Java Cryptography Architecture
online information sources
biblio
Fluid Intelligence Doesn't Matter! Effects of Code Examples on the Usability of Crypto APIs
Submitted by
grigby1
on Wed, 01/20/2021 - 3:20pm
pubcrawl
resilience
Resiliency
security
Cryptography
Libraries
APIs
API
Computer bugs
Task Analysis
Compositionality
software engineering
intelligence
usability
application programming interface
Particle measurements
Example Code
biblio
Web APIs in Android through the Lens of Security
Submitted by
grigby1
on Wed, 01/20/2021 - 3:19pm
security of data
pubcrawl
resilience
Resiliency
telecommunication security
security
internet
mobile computing
APIs
application program interfaces
API
public domain software
Compositionality
network communication
communication libraries
application programming interface
Android apps
API service providers
communication
JSON data schemas
Mobile Apps
network libraries
open-source apps
Web API URLs
Web APIs
web communication
biblio
Checking Security Properties of Cloud Service REST APIs
Submitted by
grigby1
on Wed, 01/20/2021 - 3:19pm
security of data
Cloud Computing
security
pubcrawl
resilience
Resiliency
web services
Production
fuzzing
APIs
application program interfaces
API
Computer bugs
formal verification
Compositionality
rendering (computer graphics)
application programming interface
security rules
active property checkers
capture desirable properties
checking security properties
Cloud and Web services
cloud service REST
modern cloud
Office365 cloud services
REST APIs
stateful REST API fuzzer
test generation
biblio
Optimal Selection of Cryptographic Algorithms in Blockchain Based on Fuzzy Analytic Hierarchy Process
Submitted by
aekwall
on Mon, 01/18/2021 - 10:35am
security
Scalability
Computational efficiency
data privacy
Hardware
Resiliency
pubcrawl
Cryptography
Metrics
blockchain
Distributed databases
analytic hierarchy process
cryptocurrencies
fuzzy set theory
cryptographic algorithms
AES
financial data processing
asymmetric cryptographic algorithms
ECDSA
experts grading method
FAHP
fuzzy analytic hierarchy process
SHA256
suitable cryptographic algorithm
symmetric cryptographic algorithms
Fuzzy Cryptography
biblio
Efficient Reed-Muller Implementation for Fuzzy Extractor Schemes
Submitted by
aekwall
on Mon, 01/18/2021 - 10:34am
field programmable gate arrays
FPGA
Scalability
Cryptography
Internet-of-Things
security
Table lookup
Resiliency
pubcrawl
Metrics
counterfeiting
Decoding
fuzzy set theory
security problem
electronic devices
error correction codes
PUF
physical unclonable functions
Distributed Applications
Hamming distance
attack models
area constraints
delay constraints
efficient Reed-Muller implementation
fuzzy extraction scheme
fuzzy extractor schemes
fuzzy-extractor
immunity
intrinsic hardware security
medium-range FPGA device
physical tampering
PUF circuits
PUF implementations
Reed-Muller
Reed-Muller codes
Reed-Muller ECC design
responses stability
Fuzzy Cryptography
biblio
Improving Data Privacy Using Fuzzy Logic and Autoencoder Neural Network
Submitted by
aekwall
on Mon, 01/18/2021 - 10:33am
security
Scalability
Cryptography
data privacy
electronic health records
Organizations
Resiliency
pubcrawl
privacy
Metrics
Autoencoder Neural Network
neural nets
Fuzzy logic
Biological neural networks
health care
hospitals
stored data
privacy breach
autoencoder
fuzzy logic membership functions
health sectors
privacy preserving techniques
Fuzzy Cryptography
biblio
New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature
Submitted by
aekwall
on Mon, 01/18/2021 - 10:25am
Scalability
Servers
authorisation
security
Resiliency
pubcrawl
Cryptography
Metrics
authentication
fuzzy set theory
digital signatures
public key cryptography
blockchain technology
biometrics (access control)
user authentication
blockchain system
biometric information
Biometrics authentification
biometrics fuzzy signature
biometrics-based digital signature scheme
decentralized payments
Fuzzy signature
key management devices
Secret key management
secret key management issues
secret key management technology
Fuzzy Cryptography
1
2
3
4
5
6
7
8
9
…
next ›
last »