Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Microprocessors
biblio
Design and Verification of a Novel IoT Node Protocol
Submitted by grigby1 on Thu, 05/24/2018 - 11:21am
Ports (Computers)
wireless sensor networks
Verilog
transport protocols
transport protocol
Switches
Servers
pubcrawl
Protocols
protocol verification
privacy
Compositionality
policy-based collaboration
Policy
Microprocessors
IoT node protocol verification
IoT
Internet of Things
intelligent features
Hardware
field programmable gate arrays
dynamic reconfigurable features
biblio
Healing process towards resiliency in cyber-physical system: A modified danger theory based artifical immune recogization2 algorithm approach
Submitted by grigby1 on Mon, 02/27/2017 - 11:52am
danger theory
simulation environment
Resiliency
pubcrawl170107
multiagent paradigm
multi-agent systems
Multi Agent System
modified danger theory
Microprocessors
Immune system
healing process
actuators
cyber-physical systems
cyber-physical system
convergence rates
computer architecture
biological inspired danger theory
artificial immune systems
Artificial Immune Recognization2 Algorithm
Artifical Immune System
artifical immune recogization algorithm approach
Admission control
biblio
Fabrication Attacks: Zero-Overhead Malicious Modifications Enabling Modern Microprocessor Privilege Escalation
Submitted by BrandonB on Wed, 05/06/2015 - 1:06pm
invasive software
computer architecture
cyber-attacks
embedded microprocessors
embedded systems
fabrication
fabrication attacks
Hardware
Hardware Trojans
high-performance microprocessors
zero-overhead malicious modifications
Logic gates
malicious modification
Microprocessors
modern microprocessor privilege escalation
multiprocessing systems
privilege escalation
Trojan horses
zero overhead
« first
‹ previous
1
2