Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
software engineering
biblio
New Virus Infection Technology and Its Detection
Submitted by grigby1 on Thu, 03/04/2021 - 1:45pm
composability
computer virus detection
computer virus infection
computer viruses
dynamic binary instrumentation
file virus infection
file viruses
Information age
Instruments
Metrics
Microsoft Windows (operating systems)
pubcrawl
resilience
Resiliency
Resists
security
security technology
software engineering
Viruses (medical)
Windows operating system
Windows Operating System Security
Windows system
biblio
Software Development of Electronic Digital Signature Generation at Institution Electronic Document Circulation
Submitted by aekwall on Mon, 02/08/2021 - 12:45pm
Scalability
Cryptography
Software
Resiliency
pubcrawl
blockchain
software engineering
software development
digital signatures
Information systems
RSA
document handling
DSA
electronic digital signature
Consumer electronics
ECDSA
blockchain storage
blockchain storage of electronic signatures
central Web-server
cryptographic module
documented information exchanging
electronic digital signature generation
electronic document circulation
GOST RF Standard 34.10–2018
institution electronic document circulation
secure key storage
software tools
Web-interface
biblio
Watchman: Monitoring Dependency Conflicts for Python Library Ecosystem
Submitted by aekwall on Mon, 02/08/2021 - 12:40pm
Monitoring
Scalability
Resiliency
pubcrawl
Metrics
tools
Libraries
automation
Python
software engineering
Ecosystems
software ecosystem
Human Factors
Compositionality
Cyber Dependencies
dependency conflicts
biblio
Establishing Trust in Binary Analysis in Software Development and Applications
Submitted by aekwall on Mon, 02/01/2021 - 10:41am
security of data
Software
Trusted Computing
Human behavior
pubcrawl
standards
tools
Libraries
computer security
software engineering
software development
Binary Analysis
trust
data loss
binary code
Binary codes
human trust
binary analysis techniques
binary analysis tools
binary code behavior
binary code components
binary component
binary release metadata
implementation risk assessment
knowledge acquisition
knowledge elicitations
security vulnerability minimization
software programmer trust
source security
vulnerability reports
biblio
CryptoExplorer: An Interactive Web Platform Supporting Secure Use of Cryptography APIs
Submitted by grigby1 on Wed, 01/20/2021 - 3:20pm
API
APIs
application program interfaces
application programming interface
code analysis
Compositionality
CryptoExplorer
cryptographic APIs
Cryptography
Data mining
interactive systems
interactive Web platform
internet
Java
Java Cryptography Architecture
online information sources
pubcrawl
resilience
Resiliency
security
software engineering
biblio
Fluid Intelligence Doesn't Matter! Effects of Code Examples on the Usability of Crypto APIs
Submitted by grigby1 on Wed, 01/20/2021 - 3:20pm
API
APIs
application programming interface
Compositionality
Computer bugs
Cryptography
Example Code
intelligence
Libraries
Particle measurements
pubcrawl
resilience
Resiliency
security
software engineering
Task Analysis
usability
biblio
An Improved Collaborative Filtering Recommendation Algorithm Based on Differential Privacy
Submitted by aekwall on Mon, 01/11/2021 - 12:40pm
Scalability
data privacy
Resiliency
Human behavior
pubcrawl
composability
collaborative filtering
privacy
Prediction algorithms
Stochastic processes
software engineering
Predictive models
differential privacy
privacy protection
recommender systems
Perturbation methods
gradient methods
differential privacy protection
Matrix decomposition
matrix factorization
centralized recommendation
collaborative filtering recommendation model
differential privacy constraint
differential privacy matrix factorization model
MovieLens
Netflix
noise matrix factorization model
potential characteristic matrix
recommendation accuracy loss
recommendation systems
stochastic gradient descent algorithm
ε-differential privacy
biblio
Research on Trusted Authentication Model and Mechanism of Data Fusion
Submitted by aekwall on Mon, 12/07/2020 - 11:23am
authentication
authorisation
CAS
composability
cyber-physical system security
data fusion
Data integration
Data mining
Data models
database design
Databases
information fusion
JA-SIG CAS
marine engineering
Marine vehicles
Media
message authentication
neural style transfer
Predictive Metrics
pubcrawl
Resiliency
Scalability
sensor fusion
service model
ship cluster platform
ships
software engineering
system design framework
system requirements
Trusted Authentication
trusted authentication model
Trusted Computing
trusted platform modules
unified authentication platform
biblio
A Theoretical Review: Risk Mitigation Through Trusted Human Framework for Insider Threats
Submitted by grigby1 on Tue, 12/01/2020 - 12:59pm
cyclic process
enterprise risk management activities
Human behavior
human trust
Insider Threats
insider threats risk
on-going process
People Process and Technology
Personnel
potential employees
pubcrawl
risk management
risk mitigation
security of data
software engineering
Trusted Computing
trusted human framework
biblio
Trust Beyond Computation Alone: Human Aspects of Trust in Blockchain Technologies
Submitted by grigby1 on Tue, 12/01/2020 - 12:59pm
bitcoin
blockchain
blockchain technologies
blockchain-based systems
computational trust
cryptocurrency
cryptographic verifiability
Cryptography
Distributed databases
Guidelines
Human Aspects
Human behavior
human trust
Immutability
institutional aspects
pubcrawl
software engineering
software engineers
transaction transparency
trust
Trusted Computing
1
2
3
4
5
6
7
8
9
next ›
last »