Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software
biblio
Securing MDSplus for the NSTX-U Digital Coil Protection System
Submitted by grigby1 on Thu, 02/23/2017 - 2:27pm
NSTX-U digital coil protection system
Tokamak devices
superconducting coils
Software algorithms
Software
Servers
Relays
real-time systems
real-time
pubcrawl170106
protection
plasma toroidal confinement
CAMAC
NSTX
MDSplus
machine protection
Hardware
electrical limit
DCPS
data acquisition
data
control data acquisition hardware
control
biblio
"Applying Formal Methods to Networking: Theory, Techniques, and Applications"
Submitted by grigby1 on Tue, 02/21/2017 - 12:11pm
Internet community
Tutorials
software defined networking
Software
SDN
pubcrawl170103
Protocols
networking protocols
network infrastructure
Mathematics
Internet culture
applying formal methods
Internet architecture
internet
formal verification
formal specifications
formal correctness
Computers
computer networks
Communities
clean slate Internet design
biblio
"A novel simulation approach for fault injection resistance evaluation on smart cards"
Submitted by grigby1 on Tue, 02/14/2017 - 1:15pm
fault simulation
Software
smart cards
smart card source code
Smart card
Side-channel attack
side-channel analyses
security
Registers
pubcrawl170102
Physical attack
Object oriented modeling
multiple fault attacks
instruction skip
Hardware
generic fault injection simulation tool
advanced encryption standard
fault injection simulations
fault injection resistance evaluation
Fault injection
embedded systems
embedded fault simulator
EFS
data modification
Data models
Cryptography
control flow fault models
complex smart card systems
combined attack
backward analyses
AES
biblio
"Discarded hard disks ??? A treasure trove for cybercriminals: A case study of recovered sensitive data from a discarded hard disk"
Submitted by abfox on Tue, 02/14/2017 - 12:25pm
security threats
malware
Media
Organizations
pubcrawl170101
reconnaissance activities
recovered sensitive data
Security and Privacy Awareness
security controls
malicious link
sensitive-personal organizational data
social network analysis
Software
Spear-phishing
stolen storage devices
Trust management
unsolicited e-mail
e-mail credibility
background information
Cybercrime
cybercriminals
Data protection
data recovery
Digital Forensics
discarded hard disks
discarded storage devices
advanced persistent threat
Electronic mail
hard discs
Hard disks
invasive software
malicious activities
malicious actors
malicious attachment
profile
Sarah Sheard
aviation
certification
Safety
Software
biblio
Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?
Submitted by BrandonB on Wed, 05/06/2015 - 2:58pm
Ports (Computers)
zero day detection
Zero day attacks
testing
Software
SNIDS
signature based network intrusion detection
Servers
Reliability
Code injection
Payloads
NIDS
false alarm
exploits
digital signatures
computer security
computer network security
computer architecture
biblio
Towards more accurate multi-label software behavior learning
Submitted by BrandonB on Wed, 05/06/2015 - 2:34pm
modern software system
Training
software vendor
software maintenance
software fault tolerance
Software Behavior Learning
Software algorithms
Software
public domain software
Prediction algorithms
open source programs
multilabel software behavior learning
Multi-label Learning
Baidu
MLL-GA
Ml.KNN
learning (artificial intelligence)
genetic algorithms
genetic algorithm
fault labels
F-measures
execution trace
crash report
Computer crashes
Biological cells
biblio
Scalable Packet Classification for Datacenter Networks
Submitted by BrandonB on Wed, 05/06/2015 - 11:58am
IP networks
VLANs
VLAN
virtual machines
telecommunication network routing
storage penalty
Software
Scalability
router architectures
packet forwarding
packet classification
Local area networks
length combinations
classification rules
Indexes
hash table
hardware parallelism
Hardware
firewalls
encoding
encoded rule expansion
Decision trees
datacenter networks
datacenter network
data structures
computer centres
biblio
An FPGA implementation of high-throughput key-value store using Bloom filter
Submitted by BrandonB on Wed, 05/06/2015 - 11:52am
arrays
Bloom filter
cuckoo hashing algorithm
data structures
field programmable gate arrays
file organisation
FPGA
FPGA implementation
Hardware
hash tables
high-throughput key-value store
Information filters
Key-value Store
Random access memory
Software
biblio
EM-based detection of hardware trojans on FPGAs
Submitted by BrandonB on Wed, 05/06/2015 - 11:37am
Layout
Xilinx Virtex-II Pro target
Trojan placement
Trojan horses
Software
side-channel analysis
sequential denial-of-service
RapidSmith
Probes
malicious circuitry
logic design
AES design
invasive software
Hardware Trojan injection
hardware Trojan detection
Hardware
FPGA
field programmable gate arrays
EM-based detection
EM measurement
electromagnetic emanation
Clocks
« first
‹ previous
…
72
73
74
75
76
77
78
79
80
next ›
last »