Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
IoT Components LifeCycle Based Security Analysis
Submitted by grigby1 on Fri, 02/02/2018 - 1:17pm
Insulin pumps
biomedical electronics
biomedical equipment
complex interactions
composability
computer architecture
connected insulin pump
EBIOS methodology
electronic device lifecycle
embedded systems
generic model
Hardware
Software
Internet of Things
IoT component lifecycle
lifecycle induced vulnerabilities
Metrics
performance evaluation
Production
pubcrawl
Resiliency
security
Security analysis
security of data
biblio
Using computational game theory to guide verification and security in hardware designs
Submitted by grigby1 on Fri, 02/02/2018 - 1:17pm
Metrics
complex designs
composability
computational game theory
Computational modeling
Data protection
defender strategy
design network structure
embedded systems
formal methods
game theory
Games
Hardware
hardware validation
Hardware verification
Laboratories
verification costs
open-source synthesized hardware designs
optimal security deployment strategy
pubcrawl
Reliability
reliability threats
Resiliency
resource allocation
Safety
safety properties
security
security of data
Security Properties
Stackelberg security games model
system state space
valuable verification resource allocation
biblio
Cyber-resilient industrial control system with diversified architecture and bus monitoring
Submitted by K_Hooper on Fri, 02/02/2018 - 11:05am
ICs
actuators
bus monitoring
computer architecture
control engineering computing
controller architecture
cyber vulnerabilities
cyber-resilient industrial control system
Cybersecurity
cybersecurity test bed
DeterLab
Hardware
security of data
industrial control
integrated circuits
Monitoring
production engineering computing
pubcrawl
Resiliency
resiliency approach
Resilient Security Architectures
Robustness
safety-critical ICS
SCADA
biblio
Implementation of a scalable real time canny edge detector on programmable SOC
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
Algorithm design and analysis
Canny edge detection
computer vision
Detectors
field programmable gate arrays
FPGA based acceleration
Hardware
Image edge detection
pubcrawl
PYNQ-Z1
real-time systems
Scalability
scalable
Scalable Security
security
Streaming media
biblio
MUTARCH: Architectural diversity for FPGA device and IP security
Submitted by grigby1 on Tue, 01/23/2018 - 3:24pm
policy-based governance
IP security
logical configuration keys
logic circuits
microprocessor chips
modern remote upgrade techniques
MUTARCH
physical configuration keys
Policy
IP piracy
pubcrawl
Resiliency
security through diversity principle
static keys
Table lookup
time-varying keys
Transforms
unauthorized in-field reprogramming
field programmable gate arrays
automotive systems
biomedical systems
bitstream encryption
collaboration
composability
configuration file
diverse applications
encryption
architectural diversity
FPGA device
Hardware
in-field reconfiguration
intellectual property blocks
Internet of Things
IoT
IP blocks
biblio
SECURECONFIG: NFC and QR-code based hybrid approach for smart sensor configuration
Submitted by grigby1 on Tue, 01/23/2018 - 2:58pm
Protocols
smartphone
smart sensor configuration
Smart Sensor
Smart Home
smart factory
security controller
security
SECURECONFIG
SC
Resiliency
radiofrequency identification
QR-Code
QR codes
pubcrawl
arbitrary configuration data
protocol
NFC code
Near Field Communication
Mobile handsets
Internet of Things
internet
Intelligent sensors
Hardware
dedicated security controller
cyber physical systems
Cryptography
Context
configuration
biblio
Data Protection in OpenStack
Submitted by grigby1 on Tue, 01/16/2018 - 6:33pm
operational cloud deployment
virtual machines
virtual machine images
storage encryption
security of data
security features
Security analysis
Scalability
Resiliency
public domain software
pubcrawl
Pervasive Computing Security
Organizations
basic security controls
OpenStack range
Open Source Software
open source cloud computing platform
Neutrons
Metrics
Human Factors
Hardware
encryption
Data Security
Data protection
cloud providers
Cloud Computing
biblio
Hosting distributed databases on internet of things-scale devices
Submitted by grigby1 on Tue, 01/16/2018 - 6:33pm
Resiliency
pervasive computing
Pervasive Computing Security
physical devices
processing workload
pubcrawl
racked servers
Random access memory
Raspberry Pi
performance evaluation
Scalability
security
sensor nets
storage
system resiliency
testing
virtual machines
Virtual machining
Internet of Things
Cassandra distributed database
computation power
decentralized architecture
Distributed databases
distributed device deployment
Hardware
Human Factors
interconnected devices
benchmarks
Internet of Things-scale devices
IoT nodes
IoT representative devices
IoT-representative device specifications
Metrics
mobile computing
network compression
node configuration
biblio
Mitigating HTTP GET flooding attacks in SDN using NetFPGA-based OpenFlow switch
Submitted by grigby1 on Tue, 01/16/2018 - 6:27pm
Human behavior
Uniform resource locators
Switches
Software-Defined Networking architecture
software defined networking
SDN
Resiliency
pubcrawl
Protocols
per-URL counting mechanism
OpenFlow
NetFPGA-based OpenFlow switch
Metrics
IP networks
composability
HTTP GET flooding attacks mitigation
HTTP GET Flooding
hardware-based defense system
Hardware
Floods
field programmable gate arrays
distributed denial-of-service attacks
DDoS Attacks
DDoS attack mitigation
DDoS
computer network security
Computer crime
biblio
Holistic DDoS mitigation using NFV
Submitted by grigby1 on Tue, 01/16/2018 - 6:27pm
holistic DDoS attack mitigation
virtualisation
telecommunication traffic
security
Resiliency
pubcrawl
privacy
Organizations
NFV
networking service models
network function virtualization
Metrics
Human behavior
Cloud Computing
Hardware
edge computing
distributed denial-of-service
DDoS traffic
DDoS attack mitigation
DDoS
Data protection
cyber-attack
computer network security
Computer crime
composability
« first
‹ previous
…
52
53
54
55
56
57
58
59
60
…
next ›
last »