Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Benchmark testing
biblio
Concurrency Analysis of Go and Java
Submitted by grigby1 on Tue, 06/01/2021 - 2:43pm
Java
pagerank
matrix multiplication
Go
Concurrency
Concurrent computing
Instruction sets
Web pages
Task Analysis
security
Libraries
Benchmark testing
composability
Resiliency
resilience
Metrics
pubcrawl
biblio
Graph Neural Network-based Vulnerability Predication
Submitted by aekwall on Tue, 05/18/2021 - 3:20pm
Conferences
Resiliency
Human behavior
pubcrawl
Metrics
vulnerability detection
Benchmark testing
encoding
Compositionality
Learning systems
AST
CFG
CPG
GNN
software maintenance
vulnerability predication
biblio
Burn After Reading: A Shadow Stack with Microsecond-level Runtime Rerandomization for Protecting Return Addresses**Thanks to all the reviewers for their valuable comments. This research is supported by an Australian Research Council grant (DP180104069).
Submitted by aekwall on Mon, 05/03/2021 - 1:05pm
return oriented programming
Benchmark testing
Binary codes
composability
Control Flow Integrity
Human Factors
programming
pubcrawl
Resiliency
return-oriented programming
rop attacks
Runtime
Runtime Rerandomization
Scalability
shadow stack
biblio
A Benchmark of Security Metrics in Cyber-Physical Systems
Submitted by grigby1 on Tue, 04/27/2021 - 3:59pm
Measurement
metrics testing
benchmark
Benchmark testing
Conferences
cyber-physical systems
Cyberspace
Metrics
process control
pubcrawl
security
Security analysis
Security Metrics
system security
System-of-Systems
biblio
Trusted Boot for Embedded Systems Using Hypothesis Testing Benchmark
Submitted by grigby1 on Mon, 03/29/2021 - 12:02pm
Metrics
Trusted Computing
trusted boot
Time measurement
security of data
security
Resiliency
resilience
pubcrawl
Benchmark testing
measurement uncertainty
malware
hypothesis testing benchmark
Hardware
embedded systems
Embedded System
composability
boot sequence
biblio
A Benchmarking of the Effectiveness of Modular Exponentiation Algorithms using the library GMP in C language
Submitted by aekwall on Mon, 03/22/2021 - 1:13pm
left-to-right square and multiply exponentiation algorithm
word length 1024.0 bit
Scalability
RSA
right-to-left square and multiply exponentiation algorithm
Resiliency
Registers
Public Key Cryptography.
public key cryptography
pubcrawl
multiply left-to-right square and multiply always right-to-left square and multiply always exponentiation algorithm
Montgomery ladder exponentiation algorithm
modular exponentiation algorithms
library GMP
Libraries
theoretical cryptography
left-to-right signed digit square exponentiation algorithm
Joye ladder exponentiation algorithm
Fast Exponentiation Algorithms
exponentiation
cryptology
Cryptography
computational intelligence
Complexity theory
C languages
C language
Benchmark testing
average complexity evaluation exponentiation algorithm
Compositionality
composability
biblio
CrypTFlow: Secure TensorFlow Inference
Submitted by aekwall on Mon, 03/15/2021 - 12:11pm
compiler security
TensorFlow inference code
semihonest security
semihonest MPC protocol
Secure TensorFlow inference
secure multiparty computation protocols
Porthos
plaintext TensorFlow
malicious security
malicious secure MPC protocols
inference accuracy
improved semihonest 3-party protocol
ImageNet dataset
end-to-end compiler
CrypTFlow
Aramis
Scalability
program compilers
Compositionality
inference mechanisms
Benchmark testing
public key cryptography
Logistics
Metrics
Cryptography
pubcrawl
Resiliency
Task Analysis
Protocols
Cryptographic Protocols
Hardware
data privacy
biblio
BackFlow: Backward Edge Control Flow Enforcement for Low End ARM Microcontrollers
Submitted by aekwall on Mon, 03/15/2021 - 12:08pm
program compilers
STM32 NUCLEO F446RE microcontroller
memory safety
memory corruptions
low-end ARM Cortex-M microprocessors
compiler-based toolchain
Clang/LLVM compiler
Cats
backward edge control flow integrity
BackFlow
ARM instruction set
Europe
compiler security
compiler
Safety
Instruction sets
CFI
Compositionality
storage management
Benchmark testing
program diagnostics
microcontrollers
computer security
automation
Metrics
pubcrawl
Resiliency
Scalability
biblio
High Efficiency Early-Complete Brute Force Elimination Method for Security Analysis of Camouflage IC
Submitted by grigby1 on Tue, 03/09/2021 - 2:37pm
Human behavior
simulation
security
reverse engineering
pubcrawl
policy-based governance
Logic gates
Intellectual Property (IP) Protection
integrated circuits
Human Factors
intellectual property security
High Efficiency
Force
Camouflage Integrated Circuit (IC)
brute force attacks
Brute Force Attack
Benchmark testing
Resiliency
composability
biblio
BBS: Micro-Architecture Benchmarking Blockchain Systems through Machine Learning and Fuzzy Set
Submitted by aekwall on Mon, 01/18/2021 - 11:27am
fuzzy set theory
Fuzzy Cryptography
Workload Characterization
microarchitecture benchmarking blockchain systems
micro architecture
irreversibility
Caliper
Blockbench
Benchmarking
BBS
decentralization
Fabrics
Traceability
Benchmark testing
Software Architecture
Scalability
Measurement
Distributed databases
Performance
blockchain
Metrics
Peer-to-peer computing
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
computer architecture
Protocols
Cryptography
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »