Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
embedded systems
biblio
The European H2020 project VESSEDIA (Verification Engineering of Safety and SEcurity critical Dynamic Industrial Applications)
Submitted by grigby1 on Fri, 06/26/2020 - 1:18pm
IoT security
verification engineering of safety and security critical dynamic industrial applications
tools
static analysis
Source code analysis
software fault tolerance
Software
security of data
Security and Safety Analysis
security
Safety
Resiliency
pubcrawl
program diagnostics
Metrics
certification
IoT
Internet of Things
high-criticality applications
formal verification
Formal Specification
formal methods
European H2020 project VESSEDIA
Europe
embedded systems
Cyber-security
cyber-physical systems
cyber-attacks
connected systems security
composability
biblio
Intelligent Border Security Intrusion Detection using IoT and Embedded systems
Submitted by aekwall on Mon, 06/15/2020 - 10:58am
control systems
water bodies
thermal imaging camera
intelligent border security intrusion detection
infrared imaging
harsh weather
geographical conditions
FLIR
border area monitoring
Robot sensing systems
video surveillance
Internet of Things
computerised monitoring
security
Cameras
Metrics
composability
pubcrawl
Resiliency
Raspberry Pi
embedded systems
Software
Monitoring
security of data
IoT
biblio
Energy Efficient Embedded Systems for LED Lighting Control in Traffic
Submitted by aekwall on Mon, 06/15/2020 - 10:58am
energy efficient embedded systems
universal embedded system
Smart Systems
quality lighting
microprocessor based embedded systems
low energy consumption
lighting control in traffic
lighting control
lighting
LED technology
LED lighting technology
LED lighting control
LED lighting
energy efficient microprocessor
Resiliency
energy consumption efficiency
digital embedded system
road traffic
light emitting diodes
energy consumption
embedded systems
microcontrollers
Energy Efficiency
Metrics
Roads
composability
pubcrawl
biblio
Investigation of Availability of Wireless Access Points based on Embedded Systems
Submitted by aekwall on Mon, 06/15/2020 - 10:58am
scientific wireless networks
available hardware
commercial networks
Economic indicators
embedded hardware platforms
external network adapter
internal wireless network adapter
load testing
Python programming language
wireless network
service.
single classification
software solution
threat
wireless access points
wireless infrastructure
wireless subscribers
Wireless communication
Servers
Internet of Things
Hardware
embedded systems
operating system
Resiliency
pubcrawl
composability
security
Metrics
internet
Vulnerability
radio access networks
Embedded System
operating systems (computers)
operating systems
biblio
Secure firmware update in embedded systems
Submitted by aekwall on Mon, 06/15/2020 - 10:58am
man-in-the-middle
weak point
update package encryption process
update
target hardware
symmetric encryption algorithms
symmetric encryption
specific encryption algorithms
secure update process
secure firmware update
safety critical operations
potential attackers
man-in-the-middle attacks
great numbers
asymmetric encryption algorithms
Asymmetric Encryption
security
Hash functions
intellectual property
confidentiality
authenticity
Embedded System
firmware
Metrics
composability
pubcrawl
Resiliency
embedded devices
embedded systems
telecommunication security
Cryptography
biblio
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems
Submitted by aekwall on Mon, 06/15/2020 - 10:56am
Hardware
μArmor approach
vulnerability exposure windows
statistical analysis
security of data
security
Resiliency
real-time systems
pubcrawl
operating systems (computers)
Metrics
Linux
Linux Operating System Security
Exploiting
exploit mitigation
embedded systems
Embedded System
embedded patch management
embedded operating systems
embedded memory corruption vulnerabilities
deeply embedded systems
composability
common hardening techniques
Predictive Metrics
biblio
Consideration of Security Attacks in the Design Space Exploration of Embedded Systems
Submitted by aekwall on Mon, 06/15/2020 - 10:55am
power consumption
security aware design space exploration framework
secure system designing
Secure IoT Systems
optimal design
Mixed Criticality Design Space Exploration
Embedded System Design
door access system use case
Design Process
behavioral security attack description
architectural security attack description
IoT system
Power demand
Space exploration
security requirements
security of data
security measures
tools
internet
Metrics
security attacks
composability
pubcrawl
Resiliency
cyber security
Bayes methods
embedded systems
Task Analysis
Internet of Things
Computer crime
biblio
Impact Evaluation of Embedded Security Mechanisms on System Performance
Submitted by aekwall on Mon, 06/15/2020 - 10:55am
data flows
system protection
subject-object model
reference monitor functional model
reference monitor
impact evaluation analytical model of reference monitor
impact evaluation
general-purpose systems
embedded security mechanisms
System performance
system security
Hardware Security
security of data
Mathematical model
Analytical models
Data protection
Metrics
composability
pubcrawl
Resiliency
embedded systems
performance evaluation
Access Control
Monitoring
biblio
Implementation of Multi-level Security Domain Scheme for Embedded Computer Based on MILS Architecture
Submitted by aekwall on Mon, 06/15/2020 - 10:55am
security domain
system crash
multiple embedded computers
multilevel security domain dynamic management
MILS architecture
MILS
migration cross partitions
hardware crash
functional failure
embedded computer
data isolation
access control lists
Access Control
security requirements
computer security
Metrics
Computational modeling
composability
pubcrawl
Resiliency
computer architecture
embedded systems
authorisation
biblio
Research on Improving Network Security of Embedded System
Submitted by aekwall on Mon, 06/15/2020 - 10:55am
information technology
Servers
Resiliency
pubcrawl
promotion countermeasures
network security
network attack
mobile embedded systems
Metrics
IPsec
internet
authentication
embedded systems
embedded system network
Embedded System
embedded network security
computer technology
computer network security
composability
Communication networks
certification
brand-new computer technology
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »