Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Microprocessors
biblio
Low-overhead Solutions For Preventing Information Leakage Due To Hardware Trojan Horses
Submitted by grigby1 on Thu, 05/19/2022 - 12:03pm
Trojan horses
trojan horse detection
Information Leakage
CRC
mac
Microprocessors
Cyclones
Hardware Trojans
resource management
encryption
Runtime
composability
Hardware
FPGA
Resiliency
resilience
pubcrawl
biblio
Formal Verification Approach to Detect Always-On Denial of Service Trojans in Pipelined Circuits
Submitted by grigby1 on Thu, 05/19/2022 - 12:03pm
Logic gates
pubcrawl
resilience
Resiliency
Integrated circuit modeling
system-on-chip
composability
Benchmark testing
Trojan horses
formal verification
Hardware Trojans
Scalability
denial of service
Microprocessors
Always-On
trojan horse detection
biblio
An Exploration of Microprocessor Self-Test Optimisation Based On Safe Faults
Submitted by grigby1 on Mon, 03/14/2022 - 11:20am
Microprocessors
test quality
test compaction
software-based self-test
software test library
Compaction
Very large scale integration
codes
built-in self-test
fault diagnosis
pubcrawl
Metrics
Policy Based Governance
Safe Coding
Libraries
Resiliency
resilience
Human Factors
Human behavior
biblio
Utility-Optimized Synthesis of Differentially Private Location Traces
Submitted by grigby1 on Wed, 06/02/2021 - 11:18am
Measurement
trajectory data mining
Scalability
Resiliency
resilience
Public transportation
pubcrawl
privacy-preserving data analytics
Microprocessors
Computing Theory
Markov processes
Internet of Things
Human behavior
differential privacy
Control Theory
Computing Theory and Privacy
computer architecture
privacy
biblio
Malicious user identification scheme for network coding enabled small cell environment
Submitted by grigby1 on Tue, 02/23/2021 - 1:35pm
telecommunication network reliability
Small Cells
small cell technology
reliable communication
Pollution
next generation communication technologies
network coding environment
malicious user identification scheme
fifth generation of communication networks
device to device communication
dense network coding
next generation networks
Microprocessors
5G
network coding
cooperative communication
computer architecture
Communication networks
wireless network
Protocols
composability
cellular radio
5G mobile communication
telecommunication security
Throughput
Resiliency
resilience
Metrics
pubcrawl
Peer-to-peer computing
security
biblio
Mobile Transaction Processing for a Distributed War Environment
Submitted by grigby1 on Tue, 10/06/2020 - 1:01pm
resilience
medical units
message transaction technique
Metrics
Microprocessors
military computing
mobile computing
mobile transaction processing
natural environment
optimistic concurrency control protocol
Processing time
Protocols
pubcrawl
Medical services
Resiliency
Sagas
security
serializability
Servers
Shadow paging
timely decisions
top-level commanders
transaction
transaction processing
transaction techniques
wounded soldiers
Databases
ambulance staff
battlefield environment
battlefield need
caching
Compensation Workflow
composability
computer architecture
Concurrency
concurrency control
CPS
cyber physical systems
database management systems
Actionability rules
Decision Making
distributed war environment
field hospital staff
health care
hospitals
incoming injured soldiers
irregular communications
medical authorities
medical information
medical information systems
medical service unit transactional workflow technique
biblio
SACHa: Self-Attestation of Configurable Hardware
Submitted by aekwall on Mon, 08/17/2020 - 10:36am
hardware-software system
tamper-resistant hardware module
Software
self-attestation
SACHa
Resiliency
remote attacks
Read only memory
pubcrawl
Protocols
physical attacks
Microprocessors
intended application code
Human behavior
attestation
hardware-based attestation
Hardware
FPGAs
Field-Programmable Gate Arrays
field programmable gate arrays
embedded systems
embedded software
embedded device
device attestation
configurable hardware
configurable FPGA hardware
computer architecture
composability
biblio
An Improved Cooperative Cell Outage Detection in Self-Healing Het Nets Using Optimal Cooperative Range
Submitted by grigby1 on Mon, 02/17/2020 - 4:11pm
Resiliency
Microprocessors
network parameters
noise power
optimal cooperative range
optimisation
path-loss exponent
pubcrawl
Rayleigh channels
resilience
MBS
self-healing
self-healing het nets
self-healing networks
Shadow mapping
shadowing fading factor
telecommunication network reliability
transmission power
Wireless communications
fault detection
Cell Outage Detection
composability
computer architecture
Cooperation Range
cooperative COD
cooperative communication
detection accuracy maximization
detection delay
Fading
Anomaly Detection
fault diagnosis
FBS
femtobase stations
femtocellular radio
heterogeneous networks
Heuristic algorithms
improved cooperative cell outage detection
macrobase station
biblio
Run-time Detection and Mitigation of Power-Noise Viruses
Submitted by aekwall on Mon, 02/10/2020 - 10:58am
data corruptions
multicore computing security
voltage noise data
voltage emergencies
Viruses (medical)
Threshold voltage
system crashes
run-time system
run-time estimation
resonance detection
power-noise virus mitigation
power-noise virus detection
power-noise attacks
power viruses
operating frequency
multicore microprocessors
security
Arm multicore processor
Resonant frequency
multiprocessing systems
Microprocessors
Benchmark testing
computer viruses
system-on-chip
microcontrollers
regression analysis
Metrics
pubcrawl
Resiliency
power aware computing
Scalability
biblio
Attention in Recurrent Neural Networks for Ransomware Detection
Submitted by aekwall on Mon, 10/07/2019 - 10:42am
Metrics
Windows environment
user access
Scalability
Resiliency
Recurrent neural networks
recurrent neural nets
ransomware sequences
ransomware executables
ransomware detection
ransomware attacks
Ransomware
pubcrawl
pattern locks
organizational level
Microprocessors
attention mechanisms
malware detection
malicious software
LSTM models
LSTM
Long short-term memory
Logic gates
learning (artificial intelligence)
invasive software
Human behavior
deep learning methods
deep learning
computer security
computer architecture
composability
1
2
next ›
last »