Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
microcontrollers
biblio
Classification of Malware programs using autoencoders based deep learning architecture and its application to the microsoft malware Classification challenge (BIG 2015) dataset
Submitted by grigby1 on Wed, 06/20/2018 - 11:56am
privacy
microcontrollers
Microsoft Malware Classification Challenge BIG2015
microsoft malware Classification challenge dataset
neural network
pattern classification
Pattern recognition
pattern recognition algorithms
principle component analysis
Metrics
pubcrawl
resilience
Resiliency
security
sensors
superior architecture
Time factors
gray scale images
autoencoder
classification process
classifier
Cybersecurity
deep learning
deep learning architecture
Devices
Global Positioning System
Acoustics
Human behavior
invasive software
Latches
learning (artificial intelligence)
malicious programs
malware classification
malware programs
biblio
Implementing a real-time capable WPLS testbed for independent performance and security analyses
Submitted by grigby1 on Thu, 06/07/2018 - 1:56pm
security
personal area networks
physical layer security
pubcrawl
real-time capable WPLS testbed
real-time systems
resilience
Resiliency
secret key rate estimation
Particle measurements
security analyses
security evaluations
telecommunication security
Wireless communication
Wireless Physical Layer Security
wireless sensor networks
WPLS research results
8-bit MCU 8051
off-the-shelf hardware
microcontrollers
Metrics
legitimate parties
key management
key extraction
Internet of Things
independent performance
IEEE 802.15.4 communication standard
generically multiple transceivers
Entropy
eavesdropper
Correlation
composability
Atmospheric measurements
biblio
Active Tamper Detection Circuit Based on the Analysis of Pulse Response in Conductive Mesh
Submitted by grigby1 on Wed, 04/11/2018 - 1:53pm
Metrics
Time Frequency Analysis
Shape
security modules
security data
security
Scalability
Resiliency
resilience
pulse response
pubcrawl
passive networks
passive circuits
microcontrollers
active networks
Mesh networks
low power consumption
intrusion attempt detection
frequency-domain analysis
frequency domain characterization
foil
electronic modules
detector circuits
delays
cyber physical systems
conductive mesh
Clocks
active tamper detection circuit
biblio
An Authentication Protocol for Wearable Medical Devices
Submitted by grigby1 on Mon, 04/02/2018 - 11:56am
telecommunication security
patient privacy
privacy
Protocols
pubcrawl
remote server
resilience
Resiliency
Scalability
Servers
SHA
network threats
TI CC3200 Launchpad
two-way authentication
Wearable Device
wearable device client
wearable medical devices
wearables security
Wi-Fi capable microcontroller
wireless connection
wireless LAN
wireless network communication
full-fledged security algorithm
authentication
biomedical communication
client-server systems
Communication system security
Cryptographic Protocols
data privacy
efficient authentication and encryption protocol
embedded client software
embedded systems
encryption
AES
hardware accelerated cryptography module
health care
Healthcare
Human behavior
internetconnected wearable devices
Linux computer
malicious attacks
medical computing
microcontroller
microcontrollers
biblio
Towards Lightweight Identity-Based Encryption for the Post-Quantum-Secure Internet of Things
Submitted by grigby1 on Mon, 04/02/2018 - 11:49am
key discovery procedure
word length 80 bit
time 36 ms
time 103 ms
RLWE problem
Resiliency
resilience
reconfigurable hardware component
quantum cryptography
pubcrawl
post-quantum-secure Internet of Things
multiuser scenarios
microcontrollers
Metrics
low-cost ARM Cortex-M0 microcontroller
lightweight identity-based encryption
ad-hoc network connection
Internet of Things
internet
Identity-based encryption
IBE scheme
Human behavior
encryption
embedded device
decryption
data exchange security
computer network security
Compositionality
asymmetric key distribution problem
Asymmetric Encryption
ASIACRYPT 2014
biblio
\#x003BC;DTNSec: A Security Layer for Disruption-Tolerant Networks on Microcontrollers
Submitted by grigby1 on Mon, 04/02/2018 - 11:49am
resilience
Metrics
microcontrollers
payload size
Payloads
performance evaluation
Protocols
pubcrawl
public key cryptography
man-in-the-middle attacks
Resiliency
Routing
secp128r1
secp192r1
secp256r1
security layer
store-carry-forward principle
μDTNSec
digital signatures
Asymmetric Encryption
asymmetric signatures
bundle protocol specification
Compositionality
Contiki OS
Cryptographic Protocols
delay tolerant networks
delay-disruption-tolerant networks
advanced encryption standard
disruption-tolerant networks
Elliptic curve cryptography
encryption
energy measurement
energy measurements
energy-constrained devices
hardware-backed symmetric encryption
Human behavior
biblio
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV)
Submitted by grigby1 on Fri, 02/02/2018 - 12:20pm
smart phones
IoV systems
Metrics
microcontrollers
mobile computing
mobile infrastructures
pubcrawl
Resiliency
security
sensors
IoV environment
stored evidence
strong adversarial scenario
threat model
traffic engineering computing
Trust-IoV
trustworthy evidence
trustworthy forensic investigation framework
vehicular ad hoc networks
dynamic mobile network system
Aggregates
Bluetooth
Cloud Computing
clouds
complex network system
cyber physical systems
Digital Forensics
digital forensics investigations
distributed infrastructure
Adversarial Scenario
Forensics
Human behavior
Human Factors
information sharing
Internet of Things
Internet of Things (IoT)
Internet of Vehicles
Internet of Vehicles (IoV)
biblio
A five-dimensional chaotic system with a large parameter range and the circuit implementation of a time-switched system
Submitted by grigby1 on Wed, 12/27/2017 - 11:56am
Lu system
time-switched system
Switching circuits
Switches
switched systems
Resiliency
pubcrawl
Poincare mapping
multiple chaotic attractors
microcontrollers
microcontroller unit
Metrics
Mathematical model
Lyapunov methods
Lyapunov exponent spectrum
Lyapunov exponent
antitranslation capability
Lu
information safety
five-dimensional chaotic system
field programmable gate arrays
digital circuit
Cryptography
composability
circuit implementation
chaotic system
chaotic encryption
chaotic cryptography
chaotic communication
chaos
bifurcation diagram
bifurcation
biblio
Analysis of asymmetric encryption scheme, AA \#x03B2; Performance on Arm Microcontroller
Submitted by grigby1 on Tue, 12/12/2017 - 12:25pm
Internet of Things
system-on-chip
system on chip
sensors
security protection
security
Scalability
Resiliency
random-access storage
Random access memory
public key cryptography
Public key
pubcrawl
microcontrollers
Metrics
Libraries
AA-Beta
Instruction cache
GNU multiple precision arithmetic library package
encryption
embedded microcontroller
Elliptic curve cryptography
digital arithmetic
Data Cache
Clocks
cache storage
asymmetric encryption scheme
Asymmetric
arm microcontroller
ARM Cortex-M7 microcontroller
AAβ
biblio
"Bit-Level Differential Power Analysis Attack on Implementations of Advanced Encryption Standard Software Running Inside a PIC18F2420 Microcontroller"
Submitted by grigby1 on Thu, 02/23/2017 - 11:52am
Mathematical model
side channel attacks
pubcrawl170105
Power measurement
Power demand
Power Attacks
PIC18F2420 microcontroller
microcontrollers
microcontroller security
microcontroller privacy
microcontroller
advanced encryption standard software
encryption
Differential Power Analysis
Data protection
data integrity
data confidentiality
Cryptography
cryptographic algorithms
bit-level differential power analysis attack
AES
« first
‹ previous
1
2
3
4
5
6
next ›
last »