Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Kernel
biblio
A Method for Performance Optimization of Virtual Network I/O Based on DPDK-SRIOV*
Submitted by grigby1 on Mon, 11/02/2020 - 11:40am
optimization
virtualized network
Virtualization
virtualisation
virtual network security tester
virtual network
virtual machines
Throughput
Switches
SRIOV technology
security of data
Scalability
pubcrawl
physical network card
performance optimization
performance evaluation
cyber security
optimisation
network security testing devices
Kernel
input-output programs
I/O throughput performance
i/o systems security
I/O requirement
i-o systems security
high-performance network
Hardware
general hardware platform
DPDK-SRIOV.
DPDK-SRIOV
data plane development kit
biblio
Design and Implementation of Azalea unikernel file IO offload
Submitted by grigby1 on Fri, 10/30/2020 - 12:18pm
Libraries
unikernel transfers
unikernel
Telecommunications
storage management
software libraries
security
Scalability
pubcrawl
operating systems (computers)
operating systems
operating system kernels
Offloading
Linux
azalea unikernel file IO offload
Kernel
Io offload
input-output programs
i-o systems security
I-O Systems
File systems
file system
file servers
file server
file organisation
file IO result
file IO command
biblio
Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries
Submitted by grigby1 on Fri, 10/30/2020 - 12:15pm
Scalability
page cache eviction
parallel processing
powerful privilege-escalation attacks
program diagnostics
proof-of-concept Waylaying algorithm
pubcrawl
Random access memory
rowhammer attacks
Rowhammer bug
running time
microarchitectural security threat
security
security of data
system memory
system monitoring
time 15.0 min to 200.0 min
unprivileged instructions
unprivileged posix fadvise API
victim binary
Waylaying algorithm
Waylaying method
I-O Systems
application program interfaces
binary relocation step
cache storage
Computer bugs
disk
DRAM chips
Dynamic Random Access Memory cells
exploitable physical addresses
Hardware
Heuristic algorithms
advanced Memway algorithm
i-o systems security
in-memory swapping
in-memory waylaying acceleration
input-output programs
Kernel
Linux
Linux page cache
Linux tmpfs
mainstream platforms
Memway+fadvise relocation scheme
biblio
Performance Enhancement of Snort IDS through Kernel Modification
Submitted by aekwall on Mon, 10/26/2020 - 11:47am
NAPI throughput
telecommunication traffic
Task Analysis
Snort performance
snort packet handling capacity
Snort IDS
security of data
Resiliency
pubcrawl
Predictive Metrics
performance enhancement metrics
performance enhancement
Packet loss
operating system kernels
open-source intrusion detection system
composability
NAPI packet reception mechanism
Monitoring
Metrics
Measurement
Linux Operating System Security
Linux key parameters
Linux kernel networking subsystem
Linux
Kernel subsystem
kernel modifications
Kernel modification
Kernel
Intrusion Detection
high traffic load
biblio
An Internet of Vehicles Intrusion Detection System Based on a Convolutional Neural Network
Submitted by aekwall on Mon, 10/19/2020 - 11:48am
Internet of Vehicle
wireless sensor networks
vehicular ad hoc networks
telecommunication traffic
security issues
Resiliency
pubcrawl
packet header analysis
network attacks
Metrics
low-powered embedded vehicle terminal
Kernel
Intrusion Detection System (IDS)
Intrusion Detection
Internet of Vehicles intrusion detection system
Internet of Vehicles
automobiles
internet
information security
IDS
Human Factors
Human behavior
feature extraction
cyber physical systems
Cryptography
convolutional neural networks
convolutional neural network (CNN)
convolutional neural network
convolutional neural nets
convolution
computer network security
car network
biblio
An Accelerator-based Architecture Utilizing an Efficient Memory Link for Modern Computational Requirements
Submitted by grigby1 on Tue, 10/06/2020 - 2:02pm
embedded systems
Task Analysis
security
Resiliency
resilience
Random access memory
pubcrawl
Program processors
On-Chip Communication Architectures
Metrics
Kernel
Heterogeneous systems
Hardware accelerator
Acceleration
embedded system architecture
efficient memory link
cyber physical systems
CPS
configurable accelerators
concurrency (computers)
Concurrency
computer architecture
composability
bussing system
automotive application
accelerator-based architecture
biblio
Multi-Scale Deformable CNN for Answer Selection
Submitted by grigby1 on Mon, 10/05/2020 - 1:49pm
question answering (information retrieval)
multiscale deformable convolutional neural network
n-gram models
natural language
natural language processing
nonconsecutive n-gram features
nonconsecutive words
pubcrawl
question answering
multiscale deformable CNN
question answering systems
Semantics
sentence modeling
Task Analysis
text analysis
text features
traditional CNN
variable length n-gram features
convolutional neural networks
Human behavior
Human Factors
Computing Theory and Compositionality
Answer selection
answer selection task
automatic question answering system
convolution
convolutional neural nets
Compositionality
deep neural networks
deformable convolution neural network
feature extraction
fixed-length convolutional kernels
Kernel
Knowledge Discovery
mine multiscale n-gram features
multiple deformable convolutional layers
biblio
On the Geometry of Rectifier Convolutional Neural Networks
Submitted by grigby1 on Mon, 10/05/2020 - 1:49pm
Geometry
understanding
trained rectifier networks
Tensile stress
rectifier convolutional neural networks
pubcrawl
preimage
preactivation space
natural data
learning (artificial intelligence)
Kernel
inductive bias
gradient descent
Compositionality
deep learning
convolutional neural networks
convolutional neural nets
convolutional networks
convolutional layers
Convolutional codes
convolution
computer vision
Complexity theory
Computing Theory and Compositionality
Human Factors
Human behavior
biblio
Classification of XSS Attacks by Machine Learning with Frequency of Appearance and Co-occurrence
Submitted by aekwall on Mon, 09/28/2020 - 12:35pm
pattern classification
XSS attack scripts
Word2Vec
vectorization
Uniform resource locators
Training
SVM
Support vector machines
SCW
Scalability
Resiliency
Random Forest
Radio frequency
pubcrawl
preprocessing method
Phishing
attack detection filter
machine learning algorithms
machine learning
learning (artificial intelligence)
Kernel
internet
information collection
hypermedia markup languages
Human behavior
HTTP cookies
fake HTML input form
dummy sites
Cross Site Scripting
cross site
Computer crime
biblio
Adding Custom Sandbox Profiles to iOS Apps
Submitted by aekwall on Mon, 09/21/2020 - 3:47pm
Containers
confinement
third party application
custom sandbox profiles
containment principle
confinement architecture
attack prevention mechanisms
ios
mobile devices
Mobile communication
smart phones
security of data
cyber-physical systems
privacy
composability
pubcrawl
Resiliency
system monitoring
mobile computing
Kernel
Access Control
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »