Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
automobiles
biblio
Towards Real-Time-Aware Intrusion Tolerance
Submitted by aekwall on Mon, 07/27/2020 - 12:11pm
cyber-physical realtime systems
control engineering computing
intrusion tolerance
cyber physical systems
ISO 26262
safety systems
assisted/autonomous driving
automotive use-cases
cyber-physical real-time systems
authentication
EN IEC 62061
EN ISO 13849
functional safety regulations
real-time-aware intrusion tolerance
real-time-aware intrusion-tolerant architectures
safety requirements
security holes
security
Attack vectors
mobile robots
composability
pubcrawl
Resiliency
cyber-physical systems
real-time systems
Protocols
traffic engineering computing
security of data
Safety
road vehicles
road safety
Automotive engineering
automobiles
biblio
Adding Cyberattacks To An Industry-Leading CAN Simulator
Submitted by aekwall on Mon, 07/20/2020 - 10:43am
communication bus
controller area network security
cyberattacks
controller area networks
attack prevention systems
automotive cyber-security
automotive cybersecurity
CAN simulator
car
controller area network
conformance testing
cyber vulnerability
data usage
in-vehicle network
performance critical components
representative attack demonstrations
safety critical components
automobiles
Attack detection
Logic gates
safety-critical software
simulation
Intrusion Detection
testing
Roads
pubcrawl
Resiliency
cyber-physical systems
telecommunication security
Internet of Things
traffic engineering computing
security of data
Automotive engineering
biblio
A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Example
Submitted by aekwall on Mon, 07/20/2020 - 10:43am
connected car systems
automotive electronics
controller area networks
automotive cybersecurity tests
automotive engineers
automotive field
automotive security tooling
black-box fuzz testing
CAN fuzz testing example
fuzzing
controller area network fuzz testing
cybersecurity testing
dynamic security test
dynamic software testing
Fuzz Testing
laboratory vehicle
SAE J3061
secure-by-design
pubcrawl
security of data
Internet of Things
security
Protocols
Software
embedded systems
cyber-physical systems
Resiliency
Automotive engineering
program testing
system security
program debugging
Prototypes
controller area network
black-box testing
controller area network security
automobiles
biblio
Intrusion Detection For Controller Area Network Using Support Vector Machines
Submitted by aekwall on Mon, 07/20/2020 - 10:43am
Internet of Things
Support vector machines
support vector machine based intrusion detection system
support vector machine
security countermeasures
Resiliency
pubcrawl
Protocols
process secure communication
parameter selection
machine learning
light-weight nature
Intrusion Detection
automobile communications
feature vector selection
feature extraction
ECU
delays
cyber-physical systems
controller area networks
controller area network security
controller area network
computer network security
communication standard
CAN protocol
automobiles
biblio
Designing Attacks Against Automotive Control Area Network Bus and Electronic Control Units
Submitted by aekwall on Mon, 07/20/2020 - 10:42am
Intelligent Transportation Systems
Vehicular security
Plugs
low cost CAN probe
electronic control units
defined analysis tools
controller area networks
car generation
CAN bus attacks
Brakes
autonomous vehicles
automotive control area network bus
attack scenarios
connected vehicles
automobiles
automotive electronics
controller area network security
Payloads
Engines
Probes
security protocols
pubcrawl
Resiliency
cyber-physical systems
Cryptographic Protocols
security
Internet of Things
biblio
Deep Visual Privacy Preserving for Internet of Robotic Things
Submitted by grigby1 on Fri, 07/03/2020 - 1:15pm
surveillance cameras
robot vision
robots
Scalability
security of data
service robotic platforms
Service robots
smart city applications
smart city surveillance
Smart Vehicles
Resiliency
video data base
video surveillance
visual data
visual information collection
visual privacy preserving
visualization
Web of Robotic Things
WoRT
IoRT
data privacy
Data sharing and distribution
Deep Neural Network
deep video
image segmentation
information security
Internet of Robotic things
Internet of Things
automobiles
legal access level
legal applications
Metrics
neural nets
privacy
privacy preserving
pubcrawl
resilience
biblio
Security Vulnerability Metrics for Connected Vehicles
Submitted by grigby1 on Mon, 03/09/2020 - 2:38pm
security
vulnerable function assessment
vulnerability predication
vehicle software system
vehicle manufacturers
software testers
Software systems
software integration
software engineering
security vulnerability metrics
security vulnerabilities
security testing
security of data
Security Metrics
Measurement
pubcrawl
program testing
OpenPilot
Metrics
Measurement and Metrics Texting
Couplings
connected vehicles
complex software functionalities
Autopilot feature
Automotive engineering
automobiles
metrics testing
biblio
Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys
Submitted by aekwall on Mon, 01/20/2020 - 11:59am
low-end control units
telecommunication security
security issues
secret keys
Scalability
robots
robotic applications
Resiliency
pubcrawl
private key cryptography
network security
mobile robots
message authentication
automobiles
lightweight cryptography
Lightweight Ciphers
Lightweight Cipher
lightweight authentication
hardware based individual keys
Hardware
firmware
Ciphers
Autonomous Driving
Automotive engineering
Automotive Device Authentication
automotive applications
biblio
RDI: Real Digital Identity Based on Decentralized PKI
Submitted by aekwall on Mon, 11/18/2019 - 11:49am
Brute-force Attack
PKI Trust Models
username-password approach
trusted source certificate authorities
Real Digital Identity based approach
RDI
public key binding
public key approach
point of trust attack
online transactions
Online banking
Internet banking applications
Digital identity
decentralized PKI scheme
decentralized PKI
automobiles
Registers
public key cryptography
Public key
smart contracts
message authentication
smart contract
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
authorisation
Scalability
biblio
Realization of System Verification Platform of IoT Smart Node Chip
Submitted by grigby1 on Tue, 11/12/2019 - 4:29pm
IoT smart node chip
Wireless fidelity
transmission protocol
Systems Simulation
system verification platform
system verification
simulation verification
pubcrawl
Prototypes
Protocols
protocol verification
privacy
policy-based governance
large scale integrated circuits
automobiles
IoT node
Internet of Things
FPGA-based prototype verification
FPGA
formal verification
field programmable gate arrays
efficient verification platform
design cost reduction
Compositionality
composability
collaboration
chip design cycle
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »