Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Kernel
biblio
SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors
Submitted by aekwall on Mon, 02/10/2020 - 10:57am
security of data
pubcrawl
Resiliency
SATIN
Scalability
secure introspection mechanism
secure world checking solutions
secure world introspection
security
operating systems (computers)
security policy violations
security protection
Trusted Computing
Trusted Execution Environment
trustworthy asynchronous introspection mechanism
Trustworthy Systems
TrustZone security extension
Mobile handsets
Asynchronous Introspection
composability
cyber physical systems
Evasion Attack
Instruction sets
Kernel
Metrics
microprocessor chips
ARM development board
multicore ARM processors
multicore ARM system
multicore computing security
Multicore processing
multiprocessing systems
normal world snapshot
normal-world evasion attack
biblio
Cloud-based Multi-core Architecture against DNS Attacks
Submitted by aekwall on Mon, 02/10/2020 - 10:57am
IP networks
Website visits
support service
security of data
Scalability
Resiliency
pubcrawl
network security
multiprocessing systems
multicore computing security
Metrics
malicious flow cleaning
Kernel
Artificial Intelligence
intelligent routing
flow cleaning
domain name resolution system
domain name resolution
DNS principle
DNS intelligent cloud system
DNS attacks
Defense Technologies
Computer crime
cloud-based multicore architecture
Cloud Computing
cleaning
biblio
Hardware Trojan Detection Combine with Machine Learning: an SVM-based Detection Approach
Submitted by aekwall on Mon, 02/10/2020 - 10:43am
Predictive Metrics
Microelectronics Security
Xilinx SPARTAN-6
Trojan detection rate
Trojan detection
SVM-based detection approach
support vector machine classifier
support vector machine (SVM)
side-channel analysis (SCA)
side-channel analysis
SAKURA-G circuit board
IC
hardware Trojan detection
hardware trojan
security
integrated circuits
Trojan horses
Training
composability
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
Support vector machines
invasive software
Kernel
Hardware
field programmable gate arrays
biblio
Evaluating Features Selection on NSL-KDD Data-Set to Train a Support Vector Machine-Based Intrusion Detection System
Submitted by aekwall on Mon, 01/27/2020 - 9:20am
Measurement
support vector machine-based intrusion detection system
support vector machine model
NSL-KDD data-set
global information security
economic repercussions
DoS attacks
digital industry
data set
classification model
big companies
aforementioned data-set
Denial of Service attacks
Predictive Metrics
security of data
Intrusion Detection
Companies
cyber-attacks
support vector machine
machine learning
composability
pubcrawl
Resiliency
Feature Selection
feature extraction
Support vector machines
Data models
Kernel
biblio
Detection of information security breaches in distributed control systems based on values prediction of multidimensional time series
Submitted by aekwall on Mon, 01/13/2020 - 11:18am
information security
actuator security
Time series analysis
multidimensional time series values prediction
multidimensional time series
information security breaches detection
distributed control systems
distributed control
data prediction
control system security
actuator data
time series
Kernel
control engineering computing
sensor data
process control
network attacks
convolutional neural networks
Training
Metrics
composability
pubcrawl
Human behavior
Resiliency
biblio
Local-Encoding-Preserving Secure Network Coding for Fixed Dimension
Submitted by grigby1 on Thu, 12/05/2019 - 9:47am
linear codes
telecommunication security
SLNC
security-level pairs
security level
secure linear network code
Resiliency
resilience
Random variables
pubcrawl
polynomial-time algorithm
network coding
Metrics
lower bound
local-encoding-preserving secure network coding
local encoding kernel
edge detection
Kernel
information-theoretic security
information theoretic security
Information rates
information rate
Image edge detection
fixed dimension
field size
encoding
Cryptography
computational complexity
Compositionality
coding theory
security
biblio
Peapods: OS-Independent Memory Confidentiality for Cryptographic Engines
Submitted by aekwall on Mon, 12/02/2019 - 11:08am
code fragments
compiler security
user-mode protection
Transactional memory
software engines
sensitive variables
Peapods
OS-independent memory confidentiality
memory disclosure attacks
memory disclosure attack
DRAM chips
cryptographic keys
Cryptographic Implementation
cryptographic engines
confidentiality
compiler
Scalability
automatic protection
program compilers
Registers
Compositionality
operating systems (computers)
Engines
Random access memory
OS kernel
Data protection
Metrics
pubcrawl
Resiliency
Kernel
encryption
Cryptography
biblio
Detecting Data Races Caused by Inconsistent Lock Protection in Device Drivers
Submitted by grigby1 on Tue, 11/26/2019 - 2:35pm
Kernel
Scalability
runtime analysis approach
runtime analysis
Runtime
Resiliency
resilience
pubcrawl
program diagnostics
pattern locks
Monitoring
Linux driver patches
Linux
concurrency control
Instruments
inconsistent lock protection
Human Factors
human factor
Human behavior
driver execution
DILP
device drivers
device driver
data race
Concurrent computing
biblio
Clean the Scratch Registers: A Way to Mitigate Return-Oriented Programming Attacks
Submitted by aekwall on Mon, 10/14/2019 - 9:20am
Resiliency
x64-based Linux platform
W ⊕ X security model
Task Analysis
security of data
security
scratch registers
scratch register
Scalability
ROP malicious code
rop attacks
ROP attack
Return-oriented Programming attacks
return oriented programming
return instructions
binary instrumentation
Registers
pubcrawl
programming
parameter registers
object-oriented programming
malware
Linux
Kernel
Instruction sets
Human behavior
composability
code reuse attack
calling convention
biblio
KLRA: A Kernel Level Resource Auditing Tool For IoT Operating System Security
Submitted by grigby1 on Mon, 07/01/2019 - 9:03am
operating system kernels
tools
Task Analysis
self-adaptive heuristic security mechanism
security of data
security issues
Security Audits
security
Scalability
resource-sensitive events
resource auditor
Resiliency
resilience
pubcrawl
Operating systems security
KLRA
kernel level resource auditing tool
kernel level
Kernel
IoT operating system security
iot operating system
IoT device
Internet of Things
Human Factors
Human behavior
Hardware
data privacy
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »