Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security architecture
biblio
Enhancing Continuous Service of Information Systems Based on Cyber Resilience
Submitted by grigby1 on Wed, 07/13/2022 - 12:17pm
information security
Trustworthy Systems
trust
Systems engineering and theory
security architecture
security
Scalability
Resiliency
resilience measurement
pubcrawl
policy governance
Metrics
Computing Theory
Human behavior
faces
data science
Cyberspace
cybersecurity education
cyber resilience
continuous service
Conferences
composability
collaboration
resilience
file
Physical Side Channel Attacks in Biometric System
Submitted by JasonGigax on Wed, 06/22/2022 - 2:19pm. Contributor:
Nima Karimian
Project Highlight Slides
Authentication and Biometrics Hardware
security architecture
2104520
SaTC PI Meeting 2022
file
Provably Secure, Usable, and Performant Enclaves in Multicore Processors
Submitted by JasonGigax on Wed, 06/22/2022 - 1:48pm. Contributors:
Srini Devadas
Arvind
Adam Chlipala
Project Highlight Slides
Design Systems
Formal Methods and Language-based Security Hardware
Hardware Security
security architecture
2115587
SaTC PI Meeting 2022
file
Dynamic GARUDA: Securing Programs with Hardware Monitors Using Higher Language Abstractions
Submitted by JasonGigax on Mon, 06/20/2022 - 10:23am. Contributors:
Avinash Karanth
Garett Cunningham
Gordon Stewart
David Juedes
Posters
Formal Methods and Language-based Security Hardware
security architecture
CCF-1936794
SaTC PI Meeting 2022
Poster
biblio
Software Enabled Security Architecture and Mechanisms for Securing 5G Network Services
Submitted by grigby1 on Tue, 03/01/2022 - 3:35pm
5G mobile communication
5G security
complex networks
computer architecture
Conferences
Focusing
Medical services
Network Security Architecture
NFV Security
pubcrawl
resilience
Resiliency
SDN security
security architecture
Software
State based Security Attack Detection
biblio
Challenges and prospects of communication security in real-time ethernet automation systems
Submitted by aekwall on Mon, 11/09/2020 - 12:13pm
industrial control
Information Reuse and Security
real-time Ethernet automation systems
PROFINET
open systems
automation-friendly security solution
operational technology
communication security
Compositionality
security requirements
information technology
computer network security
Local area networks
security architecture
automation
standards
pubcrawl
Resiliency
Industrial Control Systems
real-time systems
Protocols
security
biblio
A Protecting Source-Location Privacy Scheme for Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 10:54am
security architecture
Location Privacy in Wireless Networks
source location protection
Smart IoT
protecting source-location privacy scheme
Privacy Protections
multi-sinks
critical problems
CPSLP scheme
attack modes
source location privacy
cloud-based
Position measurement
daily activities
Transforms
Compositionality
Cloud Computing
probability
telecommunication network routing
Metrics
sensor nodes
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
security
telecommunication security
data privacy
biblio
Security and privacy in a middleware for large scale mobile and pervasive augmented reality
Submitted by grigby1 on Fri, 08/28/2020 - 11:32am
pervasive augmented reality
virtual elements
ubiquitous computing
testing
security of data
security architecture
Scalability
resilience
pubcrawl
privacy architecture
privacy
pervasive large scale augmented reality games
pervasive computing
Application software
personal area networks
mobile computing
mobile augmented reality games
middleware architecture
middleware
Large-scale systems
information security
Human behavior
data privacy
computer games
computer architecture
augmented reality
biblio
Towards a Security Architecture for Protecting Connected Vehicles from Malware
Submitted by grigby1 on Fri, 08/28/2020 - 10:51am
Metrics
virtualisation
vehicle malware
vehicle ECUs
unexpected consequences
security architecture
security
Scalability
Resiliency
resilience
real-time operating system
pubcrawl
operating systems (computers)
operating systems
noncritical functionalities
mobile radio
attack surface
malware
life-threatening activities
invasive software
internet
infotainment system
control engineering computing
control critical vehicle functionalities
connected vehicles
connected vehicle software
computer architecture
automotive electronics
automobiles
automobile industry
attackers
biblio
Performance evaluation of a new secure routing protocol for UAV Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 9:18am
quality of service
wormhole attack detection
UAV swarm
UAV ad hoc network
UAANET
telecommunication security
SUAP
security of data
security mechanisms
security architecture
Secure UAV Ad hoc routing Protocol
secure routing protocol
Routing protocols
Routing Protocol
Resiliency
Real-world experiment
pubcrawl
performance evaluation
network integrity
network architecture
multiple node attack
multi-robot systems
mobile ad hoc networks
mobile ad hoc network
Metrics
message authentication
ground control station
Compositionality
autonomous aerial vehicles
aircraft communication
Ad Hoc Network Security
1
2
3
next ›
last »