Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
Simulation Testing of Fault-Tolerant CPS Based on Hierarchical Adaptive Policies
Submitted by grigby1 on Thu, 07/16/2020 - 11:56am
resilience
inter-layer message transmission mechanism
message passing
Metrics
Nickel
node activity test mechanism
physical backup
pubcrawl
Redundancy
hierarchical model
Resiliency
resource allocation
safety-critical key infrastructures
simulation test
simulation testing
simulations
SPB-CPS simulation test efficiency
test resources
fault tolerance
adaptive allocation
collaborative simulation time sequence push strategy
composability
Computational modeling
Control Strategy
CPS modeling
Cyber Physical System
cyber-physical systems
Adaptation models
fault tolerance policies
fault tolerant computing
Fault tolerant systems
Fault-Tolerant CPS
fault-tolerant CPS simulation platform
Hardware
hardware redundancy technology physical backup
hierarchical adaptive policies
biblio
Study on Hybrid Collaborative Simulation Testing Method Towards CPS
Submitted by grigby1 on Thu, 07/16/2020 - 11:43am
resilience
hybrid P2P based collaborative simulation test framework
Metrics
multipriority task scheduling
Peer-to-peer computing
preemptive time threshold
program testing
pubcrawl
real-time systems
Hybrid P2P
Resiliency
scheduling
simulations
sliding window based clock synchronization
Software
Synchronization
testing
CPS system
Collaborative Simulation
collaborative simulation control strategy
composability
Computational modeling
Computer simulation
Control Strategy
CPS
CPS modeling
Analytical models
dynamic adaptive time advancement
full digital nodes
full physical nodes
groupware
Hardware
hardware in the loop nodes
hybrid collaborative simulation testing method
biblio
The Browsers Strike Back: Countering Cryptojacking and Parasitic Miners on the Web
Submitted by grigby1 on Fri, 07/10/2020 - 1:07pm
heavily obfuscated code
Web sites
under-the-hood practices
stealthy mining operations
Resiliency
resilience
pubcrawl
parasitic miners
online front-ends
mining prevention plug-ins
mining code
Metrics
learning (artificial intelligence)
Human Factors
Human behavior
browser code
hardware-assisted profiling
Hardware
exploitative exercise
Data mining
cryptojacking
Cryptography
cryptocurrency market
cryptocurrency
covert mining operations
countering cryptojacking
Computer hacking
Browsers
browser extension
browser cryptojacking
biblio
Per-File Secure Deletion for Flash-Based Solid State Drives
Submitted by grigby1 on Fri, 07/10/2020 - 11:41am
Per-file
SSD
solid state drives
Solid State Drive
Security-TRIM command
secure deletion
Scalability
resource management
real-time systems
pubcrawl
PSD-MLC scheme
programming crosstalk
programming
privacy
Per-File Secure Deletion scheme
Crosstalk
nonreal-time secure deletion
MultiLevel Cell flash memory
Media
invalid flash pages
Invalid Data Block
Hardware
GUID
globally unique identifier
flash-based solid state drives
flash memories
flash media
File update operations
data deletion
biblio
Mixed-Degradation Profiles Assessment of Critical Components in Cyber-Physical Systems
Submitted by aekwall on Mon, 07/06/2020 - 10:15am
physical components degradation
CPS reliability profile
critical subsystem
cyber aspect
degradation paths
degradation profiles
mix-degradation profiles
mixed-degradation profiles assessment
nonhomogeneous Poisson processes software reliability models
Degradation
physical-software systems
software component failure data
software component profile
software components reliability
software reliability perspective
Weibull distribution
Weibull software reliability model
Cyber Dependencies
program testing
Hardware
Software
Data models
cyber-physical systems
Resiliency
pubcrawl
Computational modeling
Metrics
Scalability
Reliability
Human Factors
software reliability
Compositionality
telecommunication network reliability
Stochastic processes
physical components
biblio
Deep Packet Inspection in FPGAs via Approximate Nondeterministic Automata
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
high-speed computer networks
Throughput
telecommunication traffic
suspicious network traffic
Scalability
Resiliency
resilience
regular expression matching
RE matching
pubcrawl
network intrusion detection systems
multistage architecture
intrusion detection system
Internet connection
internet
Acceleration
Hardware
FPGA architecture
finite automata
field programmable gate arrays
deep packet inspection
computer network security
computer architecture
automata
architecture
approximate reduction techniques
approximate reduction
approximate nondeterministic FAs
approximate nondeterministic automata
biblio
Deep Packet Inspection Through Virtual Platforms using System-On-Chip FPGAs
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
resilience
virtual platforms
virtual platform
transaction level modeling
TLM
time-varying systems
time-domain analysis
system-on-chip FPGA
system-on-chip
system on chip
Software
search engines
Scalability
Resiliency
computer architecture
pubcrawl
Mentor Vista
logic design
Inspection
hybrid CPU/FPGA
hardware-IP based architecture
hardware accelerators
Hardware
field programmable gate arrays
ESL
deep packet inspection
CPU-DMA based architecture
biblio
DoS attack mitigation in SDN networks using a deeply programmable packet-switching node based on a hybrid FPGA/CPU data plane architecture
Submitted by aekwall on Mon, 06/29/2020 - 12:57pm
deeply programmable packet-switching node
SDN
Firewalls (computing)
DoS
Software-Defined Networks
5G
data plane
denial-of-service attack
denial-of-service attacks
architectural model
deep network programmability
software-defined networking
DoS attack mitigation
DoS attack redirection
DoS attacks mitigation
DoS traffic
DPN
packet switching
packet-switching nodes
switches price
DDoS attack mitigation
computer network management
DDoS
field programmable gate arrays
FPGA
firewall
telecommunication traffic
authorisation
Hardware
Software
computer architecture
computer network security
SDN network
software defined networking
Resiliency
Human behavior
pubcrawl
composability
Metrics
internet
Filtering
biblio
Scalable DDoS Mitigation System
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
detection
DDoS attack mitigation
protection
multitarget DDoS attacks
modular filtering system
filtration
DDoS mitigation system
DDoS attacks filtering
data center
data centers
tools
internet
Metrics
Computer crime
composability
pubcrawl
Human behavior
Resiliency
Hardware
Servers
IP networks
distributed denial of service attacks
Monitoring
DDoS
computer network security
biblio
Energy-Adaptive Lightweight Hardware Security Module using Partial Dynamic Reconfiguration for Energy Limited Internet of Things Applications
Submitted by grigby1 on Fri, 06/26/2020 - 1:17pm
multiple encryption modes
energy limited internet of things applications
energy-adaptive lightweight hardware security module
high power consumption
high security levels
Internet of Things (IoT)
low power consumption
low power IoT applications
low security level
maximum dynamic power dissipation
Encryption Modes
partial dynamic reconfiguration
power 10.08 mW
power budget
power constraint
power-security level trade-off
security level values
security strength
Throughput
composability
Cryptography
encryption
Internet of Things
security
security attacks
Hardware
Data Security
pubcrawl
Ciphers
Metrics
Resiliency
cyber-physical systems
Applicability and Robustness (CAESAR)
Competition for Authenticated Encryption: Security
DPR system
dynamic partial reconfiguration
Dynamic Partial Reconfiguration (DPR)
« first
‹ previous
…
31
32
33
34
35
36
37
38
39
…
next ›
last »