Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
System software
biblio
Development of a Two-Factor Authentication System for Enhanced Security of Vehicles at a Carpark
Submitted by aekwall on Fri, 02/17/2023 - 9:49am
Image color analysis
Safe Coding
two-factor authentication
System software
Refining
Car Park
Automatic Number Plate Recognition
QR code
QR codes
security
policy-based governance
Resiliency
Metrics
pubcrawl
automobiles
authentication
Human Factors
Software
biblio
Host-Oriented Approach to Cyber Security for the SCADA Systems
Submitted by grigby1 on Wed, 05/05/2021 - 11:31am
Computers
SCADA Systems Security
SCADA/ICS
DLL injection
Code injection
fileless malware
System software
SCADA System Security
SCADA
Compositionality
malware
machine learning
Computer crime
SCADA systems
process control
cyber security
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Miniature Water Surface Garbage Cleaning Robot
Submitted by grigby1 on Thu, 12/17/2020 - 12:55pm
transmission module
Robot
robot operating systems
robots
security
Service robots
stability
STC12C5A60S2
System software
Resiliency
Transportation
transporting garbage
unmanned driving
waste disposal
water area
Water surface garbage cleaning
WiFi
Wireless fidelity
intelligent miniature water surface garbage
cleaning
cleaning module
control engineering computing
designed robot
Hardware
Human behavior
Human Factors
intelligent control
Circuit synthesis
intelligent remote control
microcontrollers
miniature water surface garbage cleaning robot
mobile robots
policy-based governance
power module
pubcrawl
resilience
biblio
A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks
Submitted by BrandonB on Tue, 05/05/2015 - 9:29am
ordered hierarchy
Virtual machine monitors
user-level applications
System software
supervisory programs
storage management
security of data
processor architecture
privileged system software
privilege level
permission mechanism
Permission
performance overhead
arbitrary malicious activities
operating systems
noninclusive memory permissions architecture
modern computer system protection
modern commodity systems
Memory management
hypervisor code
high-privileged software layer
hardware-supported page permission scheme
hardware complexity
Hardware
cross-layer attack protection
complex software stack protection