Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Instruments
biblio
Trustworthy reconfigurable access to on-chip infrastructure
Submitted by grigby1 on Fri, 02/02/2018 - 12:29pm
security
reconfigurable scan network
reconfigurable scan networks
Registers
Resiliency
RSN
scan pattern generation method
secure DFT
secure pattern retargeting
pubcrawl
security problem
system-on-chip
trustworthiness
trustworthy access pattern generation
trustworthy access sequences
trustworthy data transmission
trustworthy reconfigurable access
Trustworthy Systems
IEEE Std 1500
composability
cyber physical systems
data communication
embedded systems
external interfaces
Hardware Security
IEEE standards
IEEE Std 1149
access mechanisms
IEEE Std 1687
IJTAG
Instruments
integrated circuit testing
JTAG
Latches
Multiplexing
on-chip embedded infrastructure
biblio
Leveraging Data Provenance to Enhance Cyber Resilience
Submitted by K_Hooper on Fri, 02/02/2018 - 10:05am
Resiliency
pubcrawl
Linux
Kernel
Instruments
Electronic mail
Databases
data provenance
data integrity
cyber resilience
computer architecture
background information
security of data
secure systems
Resilient Security Architectures
biblio
Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts
Submitted by grigby1 on Tue, 01/16/2018 - 5:34pm
malware sandboxes
wear-and-tear artifacts
Virtualization
Virtual machining
tools
statistical models
statistical analysis
spotless sandboxes
security
Scalability
sandbox evasion techniques
sandbox
Resiliency
pubcrawl
Metrics
Bare-metal Host
malware analysis systems
Malware Analysis
malware
invasive software
Instruments
Human Factors
evasion
Environment Aware Malware
dynamic analysis
Decision trees
data analysis
Companies
BIOS Security
biblio
Lightweight Provenance Service for High-Performance Computing
Submitted by grigby1 on Tue, 12/12/2017 - 12:27pm
Instruments
usability
rich metadata
Resiliency
pubcrawl
Provenance
Metrics
Lightweight
Kernel
composability
Human Factors
Human behavior
History
high-performance computing
Data models
data management
Context modeling
Compositionality
biblio
A Feasibility Study of Autonomically Detecting In-Process Cyber-Attacks
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
Scalability
normal application behavior
off-line models
on-line models
perturbed applications
program transformation
pubcrawl
QoS requirements
quality-of-service requirements
Resiliency
Runtime
Monitoring
security
security of data
Software
software development process
software vulnerabilities
supervised training
Trusted Computing
trusted software application
unsafe actions
web applications
features extraction
application-agnostic cyber-attack detection system
Attack vectors
attacker
autonomic alert system
autonomic cyber-attack detection system
Autonomic Security
call graph
control flow
exemplar Web-based applications
feature extraction
application execution
heterogeneous software systems
in-process cyber-attacks
Instruments
Java
learning (artificial intelligence)
learning strategies
lightweight structures
machine learning techniques
Metrics
biblio
A proven method for identifying security gaps in international postal and transportation critical infrastructure
Submitted by grigby1 on Wed, 03/08/2017 - 1:24pm
supply chain management
resilince management
risk analysis
security
security gap identification
security risk mitigation
shipping processing facilities
ships
Standards organizations
pubcrawl170112
surface to-air missile system
Transportation
transportation critical infrastructure security
transportation processing facilities
United States Postal Inspection Service
UPU standards
USPIS
worldwide commerce
international scale
critical transportation services
field instrument
global supply chain
Inspection
Instruments
international community
international mail processing centers
international postal infrastructure
critical infrastructures
military aircraft
missiles
National security
Organizations
physical security
physical security assessment method
Postal services
biblio
Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG
Submitted by BrandonB on Tue, 05/05/2015 - 8:54am
random number generator
Whirlwind RNG
VM snapshots
VM boots
virtualized Linux
virtualized environments
Virtualization
virtual machines
virtual machine
software-based random number generators
cryptographic secrets
not-so-random numbers
Linux RNG systems
Linux
Kernel
Instruments
Hardware
entropy sources
Entropy
Cryptography
biblio
Reducing Mistrust in Agent-Human Negotiations
Submitted by BrandonB on Thu, 04/30/2015 - 12:37pm
Educational institutions
Intelligent systems
Joints
multi-agent systems
multiissue negotiation
face-to-face negotiation
Instruments
computational agent
Context
socially intelligent agent
Economics
online negotiation
software agents
Trusted Computing
agent-human negotiation
agent-human negotiations
online negotiation setting
socially intelligent agents
software agent
trusting individual
online interaction
« first
‹ previous
1
2
3
4
5
6