Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
embedded systems
biblio
A secure and reliable coding scheme over wireless links in cyber-physical systems
Submitted by grigby1 on Fri, 10/26/2018 - 3:52pm
telecommunication network reliability
radio links
radio networks
Receivers
Reliability
replay attacks
Resiliency
Scalability
security
pubcrawl
telecommunication security
transmission protocol
Wireless communication
wireless communication links
wireless network
wireless networks
wireless sensor networks
encryption
coding scheme security
communication protocol security
Cryptographic Protocols
cyber threats
cyber-physical system
cyber-physical systems
embedded systems
encoding
coding scheme reliability
encryption matrices
forward error correction
forward error correction coding
lightweight coding method
matrix algebra
network coding
Protocols
biblio
Evaluating the effects of cyber-attacks on cyber physical systems using a hardware-in-the-loop simulation testbed
Submitted by Katie Dey on Sun, 09/30/2018 - 11:22am
Hardware
physical system
actuation capability
cyber physical systems
Software
Computational modeling
Analytical models
computer architecture
computer security
physical components
hardware-in-the-loop
Model Integrated Computing
vulnerability assessment
resilience
cyber-physical system
Experimentation
testbed
HIL testbed
embedded systems
hardware-in-the loop simulation
security of data
software engineering
cyber-attack effect evaluation
hardware-in-the-loop simulation testbed
embedded computers
system functions
cyber-physical systems
simulation environment
cybersecurity design process
platform specific performance measurements
railway transportation system
CPS attack experiments
model based software development framework
cyber components
biblio
Secure and concealment in cluster based framework on vehicular networks
Submitted by grigby1 on Wed, 06/20/2018 - 11:28am
Roads
wireless sensor networks
Wireless Sensor Network
vehicular networks
Vehicular Communication
vehicular ad hoc networks
vehicular ad hoc network (VANET)
vehicular ad hoc network
VANET networks
telecommunication security
sensor nodes
Selfish node
security and privacy
security
secure concealment
Cloud Computing
Resiliency
resilience
pubcrawl
privacy
Metrics
MANET
lightweight cloud environment
Incentive scheme
embedded systems
Delay tolerant network (DTN)
Conferences
Compositionality
cluster based framework
biblio
Verification and Validation of a Cyber-Physical System in the Automotive Domain
Submitted by grigby1 on Thu, 06/07/2018 - 2:08pm
probability parameters
EAST-ADL
EAST-ADL constraints
EAST-ADL/Stateflow
energy constraints
extended ERT constraints
formal statistical analysis
functional quality assurance
mapping rules
modified EAST-ADL
nonfunctional quality assurance
parallel languages
probabilistic extension
domain specific architectural language
S/S models
safety-critical automotive embedded system design
semantics denotation
Simulink Design Verifier
Simulink/Stateflow integration
software packages
transformed energy-aware real-time behaviors
UPPAAL models
UPPAAL-SMC
verifiable UPPAAL- SMC models
Verification & Validation
Stochastic Computing Security
probability
security
cyber-physical systems
pubcrawl
Scalability
software quality
Analytical models
Wheels
delays
Stochastic processes
traffic engineering computing
Cameras
resilience
formal verification
CPS
embedded systems
Automotive engineering
Resiliency
quality assurance
power aware computing
software development
Stochastic computing
autonomous traffic sign recognition vehicle
cyber-physical system validation
cyber-physical system verification
biblio
Unreliable memory operation on a convolutional neural network processor
Submitted by grigby1 on Thu, 06/07/2018 - 2:06pm
Reliability
Kernel
Memory management
MNIST dataset
neural nets
Neural Network Resilience
power aware computing
pubcrawl
Random access memory
inference capabilities
resilience
Resiliency
severe fault-injection rates
size 28.0 nm
software fault tolerance
storage management chips
Training
unreliable memory operation
embedded dynamic RAM system
bit-cells
classification challenges
CNN resilience
convolutional neural network processor
data elements
Degradation
detection challenges
DRAM chips
bit protection
embedded systems
error probability degradation
fault diagnosis
fault mitigation strategies
fault tolerance
fault tolerant computing
feature maps memory space
hardware memories
biblio
A red team blue team approach towards a secure processor design with hardware shadow stack
Submitted by grigby1 on Thu, 06/07/2018 - 2:02pm
private data access
Trusted Computing
software attacks
security of data
security
RISC-V
return oriented programming attack
Resiliency
resilience
reduced instruction set computing
red team blue team approach
pubcrawl
processor vulnerabilities
processor design security
processor architecture
composability
Payloads
openrisc
open processor architectures
object-oriented programming
object oriented security
Metrics
memory corruption
hardware-software codesign
hardware shadow stack
Hardware
embedded systems
embedded system security
Computer bugs
computer architecture
biblio
Securing Real-Time Cyber-Physical Systems Using WCET-Aware Artificial Diversity
Submitted by grigby1 on Wed, 05/09/2018 - 1:57pm
software errors
real-time systems
resilience
Resiliency
Safe Coding
safe diversity approach
safety-critical real-time systems
safety-critical software
security
security of data
real-time processes
software vulnerabilities
static WCET analysis
timing
timing guarantees
timing properties
unacceptable performance overheads
WCET
WCET-aware artificial diversity
worst case execution time
Layout
artificial software diversity
block-level diversity
code-reuse attacks
collaboration
cyber-physical systems
embedded systems
hardware resources
Human Factors
individual probability
Artificial Diversity
Metrics
movable instruction sequences
policy-based governance
Policy-Governed Secure Collaboration
probability
pubcrawl
real-time
real-time cyber-physical systems
biblio
Internet of things (IoT) design considerations for developers and manufacturers
Submitted by K_Hooper on Wed, 05/09/2018 - 9:59am
large-scale interconnectivity
smart devices
sensors
Security by Default
Security Assurance
Scalability
Resiliency
recommended design considerations
pubcrawl
Protocols
Monitoring
authentication
IoT ecosystem
IoT Design
IoT application
IoT
Internet of Things
information security
embedded systems
embedded security
computer network security
Business
biblio
Learning Execution Contexts from System Call Distribution for Anomaly Detection in Smart Embedded System
Submitted by grigby1 on Wed, 04/11/2018 - 1:53pm
Anomaly Detection
cyber physical systems
embedded systems
Metrics
pubcrawl
resilience
Resiliency
Scalability
security
Time Frequency Analysis
biblio
Mitigating Control Flow Attacks in Embedded Systems with Novel Built-in Secure Register Bank
Submitted by grigby1 on Wed, 04/11/2018 - 1:47pm
control flow attacks
csaw
embedded systems
Hardware Security
Human behavior
Metrics
openrisc
pubcrawl
resilience
Resiliency
threat mitigation
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »