Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
design phase
biblio
Rethinking Location Privacy for Unknown Mobility Behaviors
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
blank-slate models
Computing Theory and Privacy
Zirconium
unknown mobility
sporadic hardwired models
Quantifying privacy
profile estimation-based LPPM
privacy properties
nonsporadic location privacy scenarios
mobility patterns
Mobility Models
mechanism design
LPPM design
location privacy-preserving mechanisms
location privacy service
location privacy protections
Scalability
blank-slate approach
design phase
location privacy
Training data
data privacy
testing
Training
Data protection
privacy
pubcrawl
Human behavior
Resiliency
Data models
mobile computing
biblio
Automated Suggestions of Security Enhancing Improvements for Software Architectures
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
connected smart household devices
Software Architecture Improvements
security improvements
security enhancing improvements
Secure Software Architecture
secure applications
nonarchitecture experts
model-based development techniques
industrial automation domain
given software architecture
design phase
security
Automated Improvements
architecture redesigns
architectural improvements
specification languages
smart home domain
Software Architecture
Automated Secure Software Engineering
composability
pubcrawl
Resiliency
biblio
Applied formal methods for hardware Trojan detection
Submitted by BrandonB on Wed, 05/06/2015 - 11:38am
integrated circuits
verification techniques
Vectors
Trojan horses
Trojan assurance level
silicon structure
model checking
Mathematical model
malicious hardware modifications
invasive software
chip development process
integrated circuit design
Hardware
formal verification
formal methods
formal hardware Trojan detection
Equations
electronic engineering computing
design phase
data structures