Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Registers
biblio
LSB-Reused Protection Technique in Secure SAR ADC against Power Side-Channel Attack
Submitted by grigby1 on Fri, 09/01/2023 - 2:49pm
Compositionality
synchronous
Successive approximation register analog-to-digital converter (SAR ADC)
power side-channel attack (PSA)
LSB-reused
convolution neural network (CNN)
Information Reuse
Energy Efficiency
Pins
convolutional neural networks
Internet of Things
Prediction algorithms
side-channel attacks
Registers
composability
Resiliency
resilience
pubcrawl
security
biblio
DefendR - An Advanced Security Model Using Mini Filter in Unix Multi-Operating System
Submitted by grigby1 on Wed, 08/23/2023 - 3:34pm
Information filters
Unix OS
Multi operating system
Mini Filter
intelligent structures
FS Filter
File Security
File Manager
Debug viewer
security
i-o systems security
File systems
Kernel
Registers
Load modeling
Scalability
pubcrawl
biblio
CPSD: A data security deletion algorithm based on copyback command
Submitted by grigby1 on Fri, 06/16/2023 - 3:55pm
Classification algorithms
Computer applications
Conferences
Copyback
data deletion
Data Security
Hard disks
Media
NAND flash
pubcrawl
Registers
Scalability
Secure Erase
storage system
biblio
Data Security Structure of a Students’ Attendance Register Based on Security Cameras and Blockchain Technology
Submitted by grigby1 on Fri, 04/28/2023 - 3:53pm
Compositionality
security camera
blockchains
mechatronics
Data Security
computational intelligence
Hard disks
blockchain technology
Cameras
Cryptography
Registers
composability
Computer crime
Artificial Intelligence
pubcrawl
Servers
security
biblio
SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services
Submitted by grigby1 on Fri, 03/03/2023 - 12:16pm
Compositionality
SIM card based authentication
mobile network operator
cellular network
passwords
iOS Security
Mobile Security
fault diagnosis
Pipelines
malware
security
Registers
Cellular networks
authentication
Resiliency
resilience
Metrics
Human Factors
pubcrawl
biblio
A Secure Smart Meter Application Framework
Submitted by grigby1 on Fri, 03/03/2023 - 12:15pm
Registers
billing
flexibility
iOS Security
smart meter
Mobile communication
trustworthiness
operating systems
Compositionality
security
smart phones
smart meters
electricity
Resiliency
resilience
Metrics
Human Factors
pubcrawl
biblio
Implementation of Lightweight Cryptography Core PRESENT and DM-PRESENT on FPGA
Submitted by aekwall on Fri, 03/03/2023 - 10:58am
Registers
Lightweight Ciphers
PRESENT
lightweight hash function
lightweight block cipher
DM-PRESENT
lightweight cryptography
cyber-physical systems
Power demand
field programmable gate arrays
Ciphers
Hash functions
Resiliency
Scalability
pubcrawl
Internet of Things
Hardware
biblio
Risk Management Process in the Digital Environment
Submitted by aekwall on Fri, 01/13/2023 - 3:58pm
Standards organizations
Security Risk Management
standardization
Risk
quality management system
knowledge base
information technology
digitalization
digital systems
digital organization
Organizations
knowledge based systems
Companies
Registers
risk management
Resiliency
Metrics
Scalability
pubcrawl
Human Factors
biblio
ARCHIE: A QEMU-Based Framework for Architecture-Independent Evaluation of Faults
Submitted by aekwall on Sun, 10/16/2022 - 6:30pm
Fault injection
white box cryptography
Tiny Code Generator
QEMU
fault analysis
embedded system security
automatic fault simulation
codes
Random access memory
embedded systems
Inspection
Manuals
Registers
composability
Resiliency
Metrics
pubcrawl
tools
biblio
Discovering HTTPSified Phishing Websites Using the TLS Certificates Footprints
Submitted by grigby1 on Thu, 10/13/2022 - 12:17pm
Logic gates
Monitoring
Servers
pubcrawl
Human behavior
Registers
Public key
Phishing
HTTPs
Electronic mail
Public-Key Certificate
1
2
3
4
5
6
7
8
9
next ›
last »