Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Kernel
biblio
Side Channel Attacks in Computation Offloading Systems with GPU Virtualization
Submitted by grigby1 on Fri, 04/17/2020 - 9:23am
Runtime
Metrics
mobile computing
mobile systems
operating system
privacy
pubcrawl
resilience
Resiliency
Libraries
side channel attack
side channel attacks
side-channel attacks
virtual machine
virtual machines
virtualisation
Virtualization
virtualization privacy
graphics processing units
Cloud Computing
composability
computation offloading systems
computation performance
Cryptography
GPU systems
GPU vendors
GPU virtualization
cloud
high-performance GPUs
Human behavior
Human Factors
intensive computation
Internet of Things
IoT
Kernel
learning (artificial intelligence)
biblio
Convolutional Neural Network based Foreground Segmentation for Video Surveillance Systems
Submitted by aekwall on Mon, 04/13/2020 - 9:28am
Biological system modeling
video surveillance systems
video sequences
upsampled feature mask
static foreground object
image sequences
illumination changes
ground truth
foreground segmentation methods
foreground segmentation algorithm
Foreground segmentation
extracted feature maps
dynamic backgrounds
constructed foreground mask
Change detection algorithms
Change detection
Kernel
computer vision
video surveillance system
video surveillance
object detection
interpolation
image segmentation
Entropy
convolutional neural network
convolutional neural nets
CNN
Metrics
pubcrawl
Human behavior
Resiliency
feature extraction
biblio
A Formal Approach to Secure Speculation
Submitted by grigby1 on Fri, 04/03/2020 - 11:55am
SMT
meltdown
microarchitectural side-channels
mitigation
observational-determinism
out-of-order-execution
safety-property
secure speculation property
secure speculative execution
side-channel
information-flow
software mitigations
Spectre
speculation
trace property-dependent observational determinism
trace-property
transient execution attacks
transient-execution
uclid5
resilience
formal verification
security
pubcrawl
Resiliency
verification
microarchitecture
Program processors
Transient analysis
Linux
Kernel
security of data
Metrics
Compositionality
provable security
formal
formal approach
Formal-Verification
hyperproperty
information flow security properties
biblio
An Ensemble Approach for Suspicious Traffic Detection from High Recall Network Alerts
Submitted by grigby1 on Fri, 04/03/2020 - 11:19am
Training
feature extraction
machine learning
Forestry
Support vector machines
pubcrawl
security
Kernel
Metrics
graph mining
search engines
web spam
webgraphs
predictive security metrics
biblio
HyperPS: A Hypervisor Monitoring Approach Based on Privilege Separation
Submitted by grigby1 on Fri, 03/27/2020 - 10:28am
security of data
policy-based governance
privilege separation
pubcrawl
Registers
resilience
Resiliency
Safe Coding
security
operating system kernels
security-sensitive system resources
system monitoring
system software error
Trusted Computing
trusted environment
Virtual machine monitors
virtual machines
Virtualization
Kernel
cloud environment
collaboration
guest virtual machine security
Human behavior
Human Factors
HyperPS
hypervisor monitoring
hypervisor security
Cloud Computing
KVM hypervisor
Linux
Logic gates
Metrics
microhypervisor reducing attack surface
Monitoring
monolithic operating system
biblio
A Low-Overhead Kernel Object Monitoring Approach for Virtual Machine Introspection
Submitted by grigby1 on Mon, 03/09/2020 - 12:25pm
pubcrawl
virtualisation
virtual-machine-introspection-based security monitors
Virtual machining
virtual machines
virtual machine security
Virtual machine monitors
virtual machine introspection
tools
system monitoring
storage management
Semantics
security of data
security
Cloud Computing
page-level monitoring
page-level monitor
page-level memory monitor
out-of-virtual-machine security tools
operating system kernels
Monitoring
monitor target kernel objects
memory pages
memory page
low-overhead kernel object monitoring
kernel object modification monitoring
Kernel
dentry object monitoring
biblio
LED Alert: Supply Chain Threats for Stealthy Data Exfiltration in Industrial Control Systems
Submitted by grigby1 on Wed, 02/26/2020 - 3:41pm
programmable logic controller
Kernel
LED alert
light emitting diodes
Measurement
Metrics
operation technology
persistent threats
privacy
programmable controllers
invasive software
pubcrawl
real-time operation
Smart Systems
supply chain attack
supply chain security
supply chain threats
supply chains
threat vectors
Trojan horses
embedded systems
attack vector
computer security
Air gaps
CPU performance
cyber domain
Data Exfiltration
device tree
direct memory access
DMA transfer speed
anomaly detection techniques
Embedded Systems Security
firmware
firmware modification
firmware trojan
Hardware
industrial control
Industrial Control Systems
industrial domain
industrial Internet-of-Things
biblio
Time-Related Hardware Trojan Attacks on Processor Cores
Submitted by grigby1 on Wed, 02/26/2020 - 3:39pm
real-time clock
Trojan horses
trojan horse detection
trigger conditions
time-related Hardware Trojan attacks
time information
system power-on
supply chain security
specific time period passes
specific realworld time
RISC-V processor
Resiliency
resilience
relative-time based Trojan
real-time systems
real-time clock circuits
Clocks
Random access memory
pubcrawl
Payloads
modern electronic systems
microprocessor chips
Kernel
invasive software
internal information
Hardware Trojan designs
hardware trojan
Hardware
extra power consumption
design security
cyber physical systems
biblio
Learning to Identify Security-Related Issues Using Convolutional Neural Networks
Submitted by aekwall on Mon, 02/10/2020 - 11:10am
open source issues
Semantics
user interfaces
agile development practices
aid development teams
CNN
high dimensional word embeddings
issue descriptions
Man-machine systems
natural language descriptions
security issues
robust security assurance
SDL
security-focused automation
security-related content
security-related requirements
software products
two-phase neural net architecture
vulnerability descriptions
software assurance
convolutional neural network
security
Kernel
computer architecture
learning (artificial intelligence)
pubcrawl
composability
deep learning
Databases
convolutional neural nets
security of data
Companies
ontologies (artificial intelligence)
Data mining
public domain software
software security
Scalability
software quality
Human Factors
biblio
Heterogenic Multi-Core System on Chip for Virtual Based Security
Submitted by aekwall on Mon, 02/10/2020 - 10:58am
multiprocessing systems
multicore computing security
virtual-based security
the GOST
standard symmetric key block cipher
neuromatrix
neural network emulation
heterogenic multicore system on chip
heterogenic multi-core system-on-chip
GOST
coding information
Cipher
virtual reality
AES
signal processing
DES
Scalability
Image Processing
assembly language
Computers
microsoft windows
Decoding
neural nets
standards
Metrics
pubcrawl
Resiliency
Kernel
system-on-chip
Hardware
encryption
Cryptography
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »