Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
security issues
biblio
One Size Does Not Fit All: A Grounded Theory and Online Survey Study of Developer Preferences for Security Warning Types
Submitted by aekwall on Mon, 03/15/2021 - 12:09pm
security of data
Scalability
Organizations
security
Software
Resiliency
pubcrawl
Metrics
tools
machine learning
software engineering
static analysis
software development
program diagnostics
security issues
Compositionality
compiler security
secure software
security tools
14 professional software developers
50 professional software developers
code security
developer preferences
developer security warnings
development tools
Grounded Theory study
Qualitative research
security checkers
security warning types
security warnings
static analysis engines
warning interactions
warning type
biblio
Security across abstraction layers: old and new examples
Submitted by aekwall on Mon, 03/15/2021 - 12:08pm
security
security of data
Scalability
Hardware
Resiliency
pubcrawl
Metrics
Java
security issues
Compositionality
Instruction sets
program compilers
Computer languages
secure compilation
compiler security
Context modeling
operating systems
abstraction layers
cross-layer issues
cross-layer nature
cross-layer security issues
higher level abstractions
ICT application
ICT system
Instruction Set Architecture
ISA
single level
source code level
source programming language
successive layers
biblio
Security Issues Seclusion in Bitcoin System
Submitted by grigby1 on Tue, 03/09/2021 - 2:49pm
adversarial attacks
Anonymity and Privacy
assets
bitcoin
Bitcoin privacy
Bitcoin system
blockchain
crypto-currency
cryptocurrencies
cryptocurrency
data privacy
digital currency
exchange
exchange trading commodity
Human behavior
market
Peer-to-peer computing
peer-to-peer payment network
pseudonames
pubcrawl
Scalability
security
security issues
trading
transaction management
transaction processing
transaction verification
user identity
User profile
biblio
A Scalable Blockchain-based Approach for Authentication and Access Control in Software Defined Vehicular Networks
Submitted by grigby1 on Tue, 02/23/2021 - 2:58pm
Access Control
access control issues
access control mechanism
authentication
authorisation
authorization
blockchain
blockchain ledger
blockchain technology
computer architecture
control systems
cryptocurrencies
Distributed databases
heterogeneous networks
interconnected blockchain sub-networks
IoV
message authentication
Network reconnaissance
open systems
pubcrawl
resilience
Resiliency
Scalability
scalable architecture
scalable blockchain-based approach
SDN
SDN controllers
SDVN devices
SDVN features
SDVN requirements
security
security issues
software defined networking
software defined vehicular networking
software defined vehicular networks
telecommunication network planning
telecommunication security
unauthorized SDN controller
unauthorized switch
vehicular ad hoc networks
biblio
An Appraisal over Intrusion Detection Systems in Cloud Computing Security Attacks
Submitted by grigby1 on Wed, 02/03/2021 - 2:01pm
attacks
authentication
browser malware-injection attacks
Cloud Computing
cloud computing security attacks
common security breaches
Flooding Attacks
Honey Pot
Honey pot (computing)
honey pot attack
honey pots
Human behavior
Human Factors
intrusion
Intrusion Detection
Intrusion Detection Systems
invasive software
malware
procedural intrusion way
pubcrawl
resilience
Resiliency
Scalability
security
security issues
Servers
specific honey pot algorithm
Virtual machining
wrapping attacks
biblio
Automated Vulnerability Testing via Executable Attack Graphs
Submitted by aekwall on Mon, 01/25/2021 - 1:04pm
computer network security
Resiliency
pubcrawl
composability
graph theory
reachability analysis
Decision Making
risk analysis
security issues
Predictive Metrics
attack graphs
automatic test software
automated vulnerability and risk analysis
automated vulnerability testing
AVRA
cyber attack graphs
cyber risk assessment process
cyber risk assessment uncertainty
cyber risk assessments
cyber risk reduction
end-to-end process
executable attack graphs
individual attack paths
suboptimal decision making
virtual environment
vulnerability assessments
vulnerability scans
biblio
Remote Attestation based Software Integrity of IoT devices
Submitted by aekwall on Mon, 12/07/2020 - 12:24pm
antivirus
composability
cryptographic operations
Cryptographic Protocols
Cryptography
cyber-physical system security
hashed message authentication code
HMAC
HMAC values
Internet of Things
IoT
IoT devices
message authentication
neural style transfer
Predictive Metrics
pubcrawl
reasonable computational power
Resiliency
Scalability
security issues
software integrity
software trusted platform module
telecommunication security
tpm
Trusted Computing
trusted platform modules
trusted solution
biblio
IoT Denial-of-Service Attack Detection and Prevention Using Hybrid IDS
Submitted by grigby1 on Tue, 12/01/2020 - 1:45pm
pubcrawl
ACL
Anomaly-based
anomaly-based IDS
composability
computer network security
digital signatures
DoS Attack Detection
hybrid IDS
IDPS
IDS
Internet of Things
intrusion detection and prevention systems
intrusion detection system
IoT denial-of-service attack detection
IoT DoS
network packet classification
pattern classification
resilience
Resiliency
security issues
Signature-based
Signature-based IDS
biblio
Security Vulnerabilities in Handover Authentication Mechanism of 5G Network
Submitted by aekwall on Mon, 11/16/2020 - 2:50pm
3GPP
5G communication network
5G handover
5G handover key mechanism
5G handover security analysis
5G mobile communication
5g network
authentication
authentication complexity
communication entities
computer architecture
Fifth Generation mobile telecommunication technology
Handover
handover architecture
handover key mechanism
handover mechanism
inter-gNB handover
inter-gNB handover authentication mechanism
Internet of Things
IoT-based applications
key hierarchy
key resilience problem
message authentication
mobility management (mobile radio)
pre-authentication
pubcrawl
Resiliency
Resilient Security Architectures
secret keys
security counter-measures
security demands
security issues
security vulnerabilities
Security weakness
telecommunication security
Third Generation Partnership Project
biblio
EAODBT: Efficient Auditing for Outsourced Database with Token Enforced Cloud Storage
Submitted by aekwall on Mon, 11/16/2020 - 1:10pm
security of data
Cloud Computing
IP networks
data privacy
security
Resiliency
pubcrawl
composability
Metrics
Databases
Reliability
database management systems
security issues
storage management
outsourcing
database outsourcing
Outsourced Database Integrity
cloud service provider
database administration
database encryption
database privacy
EAODBT
efficient auditing for outsourced database
information proprietor
Integrity Auditing
Invertible Bloom Filter
outsourcing computation
Query Auditing
search results provability
token enforced cloud storage
1
2
3
4
5
6
7
8
next ›
last »