Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Memory management
biblio
Efficient and Safe Control Flow Recovery Using a Restricted Intermediate Language
Submitted by grigby1 on Thu, 09/26/2019 - 10:24am
security
program diagnostics
program verification
pubcrawl
resilience
Resiliency
restricted control transition intermediate language
Safe Coding
safe control flow recovery
program compilers
security mechanisms
security of data
security policies
Security Validation
Semantics
software fault tolerance
source code level
Explosions
Bianry Analysis
collaboration
Computational modeling
Conferences
Control Flow Recovery
control-flow recovery
data flow analysis
data-flow analyses
automatic analysis
Formal Specification
Human behavior
Human Factors
low-level object code
Memory management
Metrics
policy-based governance
biblio
Program-flow attestation of IoT systems software
Submitted by aekwall on Wed, 02/13/2019 - 11:58am
malware
TrustZone
static attestation phase
static
software modification
security of data
security
Runtime
Resiliency
remote software-based attestation mechanisms
Remote Attestation
pubcrawl
programming
program-flow attestation
Program-Flow
Memory management
application program flow
IoT systems software
IoT
Internet of Things
impractical constraints
Human behavior
hardware devices
Hardware
dynamic attestation technique
dynamic
Dual Attestation
distributed processing
device integrity measurement
data integrity
composability
attestation
biblio
Alto: Lightweight VMs Using Virtualization-Aware Managed Runtimes
Submitted by grigby1 on Thu, 01/31/2019 - 12:27pm
composability
Cryptography
cyber physical systems
datacenters
Memory management
minimal TCBs
pubcrawl
Resiliency
virtual machine security
Virtualization
biblio
Intel® Software Guard Extensions (Intel® SGX) Architecture for Oversubscription of Secure Memory in a Virtualized Environment
Submitted by grigby1 on Mon, 12/03/2018 - 3:03pm
composability
Human behavior
Memory management
Metrics
Oversubscription
privacy
pubcrawl
resilience
Resiliency
SGX
Software Guard Extensions
Virtualization
virtualization privacy
biblio
Neighbor-aware based forwarding strategy in NDN-MANET
Submitted by grigby1 on Mon, 06/11/2018 - 3:37pm
mobility management (mobile radio)
Wireless communication
Scalability
Resiliency
resilience
pubcrawl
performance evaluation
Packet loss
Neighbor-aware based forwarding strategy
neighbor-aware
NDN-MANET
NDN
named data networking
Named Data Network Security
aware forwarding
mobile ad hoc networks
Memory management
MANET
Internet architecture
internet
Human behavior
hop node
greedy forwarding strategy
greedy algorithms
forwarding strategy
delays
data packet response
blind forwarding
biblio
Minimum energy quantized neural networks
Submitted by grigby1 on Mon, 06/11/2018 - 3:24pm
iso-accuracy depending
automated minimum-energy optimization
BinaryNets
complex arithmetic
fixed point arithmetic
fundamental trade-off
generic hardware platform
higher precision operators
int4 implementations
int8 networks
arbitrary fixed point precision
low precision weights
Minimum Energy
minimum energy QNN
QNN training
Quantized Neural Network
quantized neural networks
wider network architectures
network on chip security
resilience
Resiliency
Scalability
Hardware
neural nets
energy consumption
telecommunication security
Neural networks
Training
deep learning
pubcrawl
Memory management
Metrics
Random access memory
system-on-chip
energy conservation
power aware computing
Mobile communication
approximate computing
biblio
Unreliable memory operation on a convolutional neural network processor
Submitted by grigby1 on Thu, 06/07/2018 - 3:06pm
Reliability
Kernel
Memory management
MNIST dataset
neural nets
Neural Network Resilience
power aware computing
pubcrawl
Random access memory
inference capabilities
resilience
Resiliency
severe fault-injection rates
size 28.0 nm
software fault tolerance
storage management chips
Training
unreliable memory operation
embedded dynamic RAM system
bit-cells
classification challenges
CNN resilience
convolutional neural network processor
data elements
Degradation
detection challenges
DRAM chips
bit protection
embedded systems
error probability degradation
fault diagnosis
fault mitigation strategies
fault tolerance
fault tolerant computing
feature maps memory space
hardware memories
biblio
I(FIB)F: Iterated bloom filters for routing in named data networks
Submitted by grigby1 on Wed, 02/21/2018 - 1:48pm
information-centric networking
standards
Routing
Resiliency
resilience
pubcrawl
Policy-Governed Secure Collaboration
policy governance
named data networks
named data networking
Metrics
Memory management
iterative hashes
iterated bloom filters
Internet of Things
internet
clean slate
Information filters
Human Factors
human factor
Human behavior
hierarchical names
Future Internet
forwarding strategy
forwarding information base
energy supply
data structures
Cryptography
content distribution efficiency
Constrained Devices
collaboration
clean-slate redesign
biblio
Software-Design for Internal Security Checks with Dynamic Integrity Measurement (DIM)
Submitted by grigby1 on Tue, 02/06/2018 - 1:58pm
security software tools
internal security checks
Kernel
kernel architecture
Linux
malicious components
Memory management
memory measurment
multiple related components
pubcrawl
Resiliency
integrity measurement architecture
software design
Software measurement
software tools
system components
system state verification
TCG
The Concise Binary Object Representation (CBOR)
Trusted Platform Module (TPM)
trusted platform modules
DIM
attestation operations
binary code
Binary codes
central components
complex attestation strategies
composability
cooperation project
cryptographic hashes
Cryptography
data integrity
Aerospace electronics
DRA
dynamic integrity measurement
Dynamic Runtime Attestation
extensibility
extensible architecture
flexibility
flexible architecture
Guidelines
IMA
biblio
Trustworthy Services Built on Event-Based Probing for Layered Defense
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
Memory management
watchdogs
VMI
Virtual machine monitors
virtual appliance
Trustworthy Systems
trustworthy services
trustworthy logging
Trusted Computing
system monitoring
system hangs
Resiliency
Registers
pubcrawl
Probes
Monitoring
Attack detection
layered defense
Intrusion Detection
IDS
hypervisor
Hardware
guest-system-call events
feature extraction
event-based probing
defense-in-depth
cyber physical systems
composability
cloud-tuned intrusion detection system
cloud computing environments
Cloud Computing
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »