Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices
Submitted by grigby1 on Mon, 01/21/2019 - 12:17pm
security
memory data protection strategies
Metrics
microprocessor chips
operating system kernels
privacy
private data
pubcrawl
Resiliency
low power consumption
smart phones
types H-Securebox
Virtual machine monitors
virtual machines
virtualisation
Virtualization
virtualization privacy
ARM hardware virtualization technique
kernel-level memory data
kernel privilege
kernel level attack
Kernel
IoT devices
Internet of Things
hypervisor privilege
Human behavior
Hardware
hardened memory data protection framework
H-Securebox system
embedded systems
data privacy
composability
ARM Hypervisor
biblio
Micro-Honeypot: Using Browser Fingerprinting to Track Attackers
Submitted by grigby1 on Wed, 01/16/2019 - 2:32pm
Micro-Honeypot
browser fingerprinting technique
conventional web honeypots
cybercrime traceability
fingerprint
Fingerprint recognition
Forensics
honeypot
IP networks
Browser Fingerprinting
stepping stones
track attackers
tracking
web attacker
Web attacks
Web Browser Security
Compositionality
Browsers
data privacy
security
pubcrawl
Human behavior
Metrics
Resiliency
Hardware
invasive software
internet
Web sites
computer network security
Servers
Cryptography
Computer crime
anonymous networks
attack information
biblio
NETSIM: A Realtime Virtual Ocean Hardware-in-the-loop Acoustic Modem Network Simulator
Submitted by grigby1 on Wed, 01/16/2019 - 2:29pm
realtime realistic operation
hardware-in-the-loop
Lifting equipment
marine control
marine engineering
modems
NETSIM
Oceans
physical link hardware
hardware-in-the loop simulation
realtime virtual ocean hardware-in-the-loop acoustic modem network simulator
software/hardware system
undersea networking
vehicle dynamics
virtual ocean
virtual ocean channel simulator
virtual ocean environment
WHOI MicroModem 2 hardware
control engineering computing
pubcrawl
Human behavior
Resiliency
Scalability
Acoustics
Hardware
simulation
acoustic coupling
Computational modeling
mobile robots
acoustic propagation
acoustic communication
acoustic environment
acoustic modem telemetry
autonomous underwater vehicles
AUVs
frequent pertubation-based updates
biblio
Improving Power amp; Latency Metrics for Hardware Trojan Detection During High Level Synthesis
Submitted by grigby1 on Mon, 12/10/2018 - 11:42am
Mathematical model
work factor metrics
Unroll Factor
Trojan horses
third party IP cores
Space exploration
semiconductor industry
secure IC design process
Scalability
resource allocation
Resiliency
resilience
pubcrawl
power metrics
power consumption
microprocessor chips
adders
latency metrics
invasive software
integrated circuits
integrated circuit design
integrated chip design
high level synthesis
hardware Trojan detection
hardware trojan
Hardware
design-for-trust techniques
design space exploration process
Design Space Exploration
datapath resource allocation
cuckoo search algorithm
Benchmark testing
biblio
Distributed Osmotic Computing Approach to Implementation of Explainable Predictive Deep Learning at Industrial IoT Network Edges with Real-Time Adaptive Wavelet Graphs
Submitted by grigby1 on Mon, 12/10/2018 - 11:41am
osmotic microservice
graph-based approach
IIoT network fog layer
IIoT systems
Industrial IoT
industrial IoT network edges
IoT development costs
large scale industrial Internet of Things
Logic gates
low-level machine language
LSTM networks
network cloud layer
graph theory
real-time
real-time adaptive wavelet graphs
real-time DSP
real-time graph-based Coiflet wavelets
real-time systems
system complexities
wavelet analysis
Wavelet Graph
wavelet transforms
XAI deep learning pre-processing applications
deep learning
Internet of Things
resilience
pubcrawl
Resiliency
Scalability
Hardware
xai
learning (artificial intelligence)
artificial intelligence deep learning problem
communication network noise
data quality
Cloud Computing
delay time
delays
digital signal processing chips
digital signal processor
distributed computing
distributed edge computing
distributed osmotic computing approach
distributed processing
edge layer
explainable artificial intelligence
biblio
Toward a Sensor Trustworthiness Measure for Grid-Connected IoT-Enabled Smart Cities
Submitted by grigby1 on Mon, 11/19/2018 - 12:31pm
situational awareness
pubcrawl
resilience
Resiliency
security
Security Metrics
security of data
sensor trustworthiness measure
sensor verification
power systems
smart cities
Smart Grid Sensors
Smart Grids
smart power grids
Trusted Computing
trustworthy power generation
wireless sensor networks
Human behavior
bulk power systems
Compositionality
critical infrastructures
cyber physical systems
cyber-physical modeling
cyber-physical systems
grid-connected IoT-enabled smart cities
Hardware
Analytical models
Human Factors
Internet of Things
large-scale critical infrastructure systems security
malevolent IoT devices
Perturbation methods
power engineering computing
power system security
biblio
Power Mobile Terminal Security Assessment Based on Weights Self-Learning
Submitted by grigby1 on Wed, 11/14/2018 - 1:22pm
power system security
weights self-learning method
Training
Software
security of data
security assessment system
security assessment
security
Scalability
Resiliency
resilience
rank correlation analysis
pubcrawl
Correlation
power mobile terminal system
power mobile terminal security assessment
power mobile terminal
power engineering computing
mobile computing
machine learning
learning (artificial intelligence)
Indexes
Human behavior
Hardware
fuzzy comprehensive analysis
expert systems
biblio
The Information Security System Synthesis Using the Graphs Theory
Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
Russian Federation leISSlation
information security threats
optimal enterprise information protection system
optimality problem solution
optimality problem solution on the graph theory basis
protection vector isolation
pubcrawl
ranked descending graph construction
resilience
Resiliency
information security system synthesis based on graph theory
Scalability
security
security of data
Software
software complex basis
software information security
software restriction
tools
graph critical path
access subjects authentication
access subjects identification
computer storage media protection
enterprise information security
enterprise information security system
expert systems
FSTEC order No31
graph calculation
access delineation
graphs theory
graph theory
Hardware
hardware complex basis
hardware information security
Human behavior
information security
information security system synthesis
biblio
Evaluating the effects of cyber-attacks on cyber physical systems using a hardware-in-the-loop simulation testbed
Submitted by Katie Dey on Sun, 09/30/2018 - 12:22pm
Hardware
physical system
actuation capability
cyber physical systems
Software
Computational modeling
Analytical models
computer architecture
computer security
physical components
hardware-in-the-loop
Model Integrated Computing
vulnerability assessment
resilience
cyber-physical system
Experimentation
testbed
HIL testbed
embedded systems
hardware-in-the loop simulation
security of data
software engineering
cyber-attack effect evaluation
hardware-in-the-loop simulation testbed
embedded computers
system functions
cyber-physical systems
simulation environment
cybersecurity design process
platform specific performance measurements
railway transportation system
CPS attack experiments
model based software development framework
cyber components
biblio
System architecture for deep packet inspection in high-speed networks
Submitted by grigby1 on Wed, 09/12/2018 - 11:25am
PeerDirect
graphics processing units
Hardware
hardware tools
hardware-software solution
high-speed networks
Inspection
Mellanox
Napatech
Nvidia
graphics processing unit
pubcrawl
real-time data analysis
resilience
Resiliency
Scalability
software requirements
system architecture
Zero-copy
data communication
Central Processing Unit
computer architecture
computer network
computer network security
computing devices
CPU
CUDA
data analysis
bit rate 80.0 Gbit/s
data transmission networks
data volume real-time processing
deep packet inspection
DMA
DPDK
dpi
firewall
GPUDirect
« first
‹ previous
…
45
46
47
48
49
50
51
52
53
…
next ›
last »