Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
Large-Scale Classification of IPv6-IPv4 Siblings with Variable Clock Skew
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
machine-learned decision tree
variable clock skew
transport protocols
Training
TCP timestamps
Servers
Resiliency
pubcrawl
pattern classification
Network reconnaissance
network characteristics
Clocks
learning (artificial intelligence)
large-scale classification
IPv6-IPv4 siblings
IPv6 addresses
IPv4 addresses
IP networks
internet
Hardware
feature extraction
Decision trees
biblio
Organization of the Entrusted Calculations in Crucial Objects of Informatization under Uncertainty
Submitted by grigby1 on Tue, 02/06/2018 - 1:59pm
Prototypes
trusted platform modules
Trusted Platform Module
Trusted Computing
TPM technology (Trusted Platform Module)
tpm
the prevention of activation of not declared opportunities
the entrusted domestic environment of calculations
safe calculations
root of trust
Resiliency
Registers
pubcrawl
composability
Organizations
informatization
hypervisor security
Hardware
entrusted calculations
encoding
domestic electronic base
Cryptography
crucial objects
control of complex objects under uncertainty
Computers
biblio
A Tamper-Resistant Digital Token-Based Rights Management System
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
rights management system
message authentication
Metrics
Peer-to-peer computing
peer-to-peer manner
Protocols
pubcrawl
public key cryptography
Resiliency
internet
Scalability
Symmetric Key Cryptography
Tamper-Resistance
tamper-resistant digital token
tamper-resistant digital tokens
token owner
Ubiquitous Computing Security
Access Control
Human Factors
Human behavior
hardware-software collaboration
Hardware
groupware
eTRON architecture
digital token
Digital rights management
Cryptography
computer architecture
authorisation
authentication
asymmetric cryptography
APIs
API
biblio
Lateral Thinking for Trustworthy Apps
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
pubcrawl
Trustworthy Systems
trustworthy apps
Trusted Computing
trusted component ecosystem
Substrates
security technologies
security of data
Secure System Design
Resiliency
composability
lateral thinking
Kernel
Isolation technology
Hardware
cyber physical systems
Cryptography
critical infrastructures
critical infrastructure
biblio
Trustworthy Services Built on Event-Based Probing for Layered Defense
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
Memory management
watchdogs
VMI
Virtual machine monitors
virtual appliance
Trustworthy Systems
trustworthy services
trustworthy logging
Trusted Computing
system monitoring
system hangs
Resiliency
Registers
pubcrawl
Probes
Monitoring
Attack detection
layered defense
Intrusion Detection
IDS
hypervisor
Hardware
guest-system-call events
feature extraction
event-based probing
defense-in-depth
cyber physical systems
composability
cloud-tuned intrusion detection system
cloud computing environments
Cloud Computing
biblio
RASSS: A perfidy-aware protocol for designing trustworthy distributed systems
Submitted by grigby1 on Fri, 02/02/2018 - 1:28pm
composability
Cryptography
cyber physical systems
Decoding
Hardware
Protocols
pubcrawl
Reed-Solomon codes
Resiliency
Trustworthy Systems
biblio
Theoretical Feasibility of Statistical Assurance of Programmable Systems Based on Simulation Tests
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
simulated hardware platform
ultra-high reliability levels
theoretical feasibility
testing
test time expansion problem
Test Time Expansion
statistical testing
statistical test
statistical assurance
statistical analysis
software-intensive system
software reliability
software assurance
Software
simulation tests
composability
Scalability
reliability theory
Reliability
pubcrawl
protection system
programmable systems
program testing
platform simulation approach
Hardware
Failure Probability
estimation
Emulation/Simulation-enhanced Test
empirical failure probability estimation
continuous operation systems
biblio
Generalize or Die: Operating Systems Support for Memristor-Based Accelerators
Submitted by grigby1 on Fri, 02/02/2018 - 1:25pm
memristors
ultra low energy
typical OS functionality
transistor feature size scaling
specialized accelerators
scientific computing
Scalability
Resiliency
quantum computing security
pubcrawl
programming
primary function
operating systems (computers)
operating system
microprocessor chips
Metrics
accelerator implementation
Memristor
master slave models
machine learning
learning (artificial intelligence)
Imaging
hardware resources
Hardware
general purpose system
field programmable gate arrays
Engines
Electronic mail
Dot Product Engine
computer architecture
composability
biblio
Cache attacks and countermeasures for NTRUEncrypt on MPSoCs: Post-quantum resistance for the IoT
Submitted by grigby1 on Fri, 02/02/2018 - 1:25pm
Post-quantum
timing
SoCs
security
Scalability
Resiliency
quantum computing security
quantum computing
pubcrawl
Cache Attack
NTRUEncrypt
Metrics
Lattices
IoT
Hardware
encryption
composability
biblio
Hardware support for embedded operating system security
Submitted by grigby1 on Fri, 02/02/2018 - 1:17pm
hardware monitor
attack
composability
Computer crime
Context
Data protection
defense
embedded operating system security
embedded OS security
Embedded System
embedded systems
field programmable gate arrays
FPGA prototype
FPGA-based prototype implementation
Hardware
hardware support
Hardware-based monitoring
Internet-connected embedded systems
Metrics
Monitoring
monitoring graph
operating system
operating systems (computers)
pubcrawl
Registers
remote hacking attacks
Resiliency
security
software-based protection mechanisms
« first
‹ previous
…
51
52
53
54
55
56
57
58
59
…
next ›
last »