Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
Threats Against the Virtual Machine Environment of NFV
Submitted by grigby1 on Mon, 03/09/2020 - 1:26pm
privilege escalation
VM escape threats
Virtualization
virtualisation
architectural modeling
Cloud Computing
computer architecture
computer network security
Hardware
misuse patterns
network function virtualization
NFV
on-demand network functions
Virtual machining
pubcrawl
security
security reference architecture
security threats
Software
UML diagrams
Unified modeling language
virtual machine environment
Virtual machine monitors
virtual machine security
virtual machines
biblio
Securing Virtual Machines on Cloud through Game Theory Approach
Submitted by grigby1 on Mon, 03/09/2020 - 1:25pm
resource allocation
VMVM
virtualisation
Virtual machining
virtual machines
virtual machine vitality measure
virtual machine security
Virtual machine monitors
virtual environments
virtual environment
utility function
tower defence game
security
Cloud Computing
pubcrawl
Poles and towers
operating systems (computers)
hypervisor
Hardware
Games
game theory approach
game theory
game strategy block
computer games
cloud server failure
biblio
Alternatives to Fault Injections for Early Safety/Security Evaluations
Submitted by aekwall on Mon, 03/09/2020 - 11:17am
Human Factors
Security Risk Estimation
system dependability constraints
RTL fault injection campaigns
radiation testing
market pressure
ISO 26262
intertwined hardware
HW-SW systems
functional safety standards
fault injections
dependability analysis
cyber physical systems
hardware-software codesign
Circuit faults
CPS
Safety
safety-critical software
ISO standards
cost reduction
Reliability
Metrics
pubcrawl
Resiliency
Time measurement
system-on-chip
SoC
embedded systems
Software
Hardware
Scalability
security of data
biblio
Methods and Special Processors of Entropy Signal Processing
Submitted by grigby1 on Wed, 03/04/2020 - 4:14pm
entropy-manipulated signals
Time
theoretical cryptography
theoretical comments
special processors
signal processing
pubcrawl
Program processors
probability
Probabilistic logic
probabilistic entropy
Hardware
estimation
a special processor
entropy signal processing
Entropy
Cryptography
correlation activity
Correlation
Compositionality
composability
Ciphers
cipher signals
cipher signal receivers
and structural complexity
biblio
AvTA Based Assessment of Dependability Considering Recovery After Failures and Attacks on Vulnerabilities
Submitted by grigby1 on Mon, 03/02/2020 - 1:34pm
Software
OR gates
probabilities
probability
pubcrawl
Reliability
resilience
Resiliency
security of data
maintenance engineering
software failures
software fault tolerance
software reliability
SREs
successful recovery events
System recovery
trees (mathematics)
failure analysis
Attack Tree Analysis
availability tree analysis
AvTA models
Building automation system
computer security
criticality oriented analysis
cyber security subtrees
dependability assessment
ATA technique
FMEA
FMECA
Hardware
ICS recovery
IMECA
instrumentation and control system
instrumentation and control systems
biblio
Towards a Cyber-Physical System for Hydrobatic AUVs
Submitted by aekwall on Mon, 03/02/2020 - 12:36pm
open-source UAVCAN-ROS bridge
Flight Dynamics
gazebo
hardware-in-the-loop validation
hardware-software codesign
hydrobatic AUVs
hydrobatic SAM AUV
Mission Planning
multifidelity simulations
cyber-physical system
robust hardware-software interface
Simulink
substance cloud tracking
subsystem integration
system integration
Virtual Validation
Underwater Networks
control engineering computing
Hardware
Software
cyber-physical systems
Resiliency
pubcrawl
simulation
Metrics
mobile robots
Scalability
Robot sensing systems
algae farming
autonomous underwater vehicles
AUV network
Bridges
CAN bus
control
biblio
Enabling Ubiquitous Hardware Security via Energy-Efficient Primitives and Systems : (Invited Paper)
Submitted by aekwall on Mon, 03/02/2020 - 12:30pm
Hardware Security
Ubiquitous Computing Security
ubiquitous hardware security
Thermal stability
security-sensitive applications
random number generators
pufs
power penalty
low-end devices
Low power
HW security
energy-efficient primitives
ubiquitous computing
error correction codes
security
Human Factors
Random access memory
Entropy
attacks
design requirements
Metrics
pubcrawl
Resiliency
power aware computing
attack surface
Hardware
Cryptography
Scalability
biblio
Experimental Verification of Security Measures in Industrial Environments
Submitted by aekwall on Mon, 03/02/2020 - 12:29pm
Human Factors
Ubiquitous Computing Security
vICS verification framework
industrial environments
industrial control security
industrial assets
ICS technology
formal verification
security measures
control engineering computing
ICs
industrial control
security of data
verification
Firewalls (computing)
integrated circuits
Anomaly Detection
production engineering computing
Metrics
pubcrawl
Resiliency
Software
Hardware
Scalability
biblio
True2F: Backdoor-Resistant Authentication Tokens
Submitted by aekwall on Mon, 03/02/2020 - 12:27pm
Browsers
two-party protocols
token faults
software compromise
second-factor authentication
privacy defenses
Phishing
embedded-systems
ECDSA signatures
cross-origin token-fingerprinting attacks
conventional authentication tokens
commodity hardware tokens
Backdoors
backdoor-resistant authentication tokens
two factor authentication
cryptographic keys
security
Human Factors
public key cryptography
Public key
digital signatures
authentication
privacy
web services
Computer crime
standards
pubcrawl
Protocols
Cryptographic Protocols
Hardware
data privacy
authorisation
biblio
Evaluating Fault Resiliency of Compressed Deep Neural Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:48pm
Hardware
VGG16
storage faults
software mitigation techniques
Resiliency
resilience
Quantization (signal)
pubcrawl
Predictive models
neural nets
LeNet-5
learning (artificial intelligence)
inference mechanisms
hardware mitigation techniques
Analytical models
fault tolerant computing
fault tolerance
Fault resiliency
Fault Resilience
Fault Attacks
Efficient and secure inference engines
Deep neural network model compression
deep learning
Data models
data compression
Computational modeling
compressed DNN models
compressed deep neural networks
« first
‹ previous
…
35
36
37
38
39
40
41
42
43
…
next ›
last »