Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
Secure Tera-scale Data Crunching with a Small TCB
Submitted by grigby1 on Tue, 01/16/2018 - 6:22pm
Outsourced Database Integrity
virtual storage
virtual memory
trusted hardware
trusted computing base
Trusted Computing
tera-scale data crunching
self-contained services
security of data
secure virtual memory
secure execution
Resiliency
pubcrawl
Cloud Computing
Metrics
Memory management
Libraries
LASTGT system
large-scale data
large state on a generic trusted component
Intel SGX
hypervisor
Hardware
data handling
Cryptography
composability
biblio
Encrypted computing: Speed, security and provable obfuscation against insiders
Submitted by grigby1 on Wed, 01/10/2018 - 12:18pm
coding theory
compiler security
composability
encryption
Hardware
Pipelines
provable security
pubcrawl
Random access memory
Registers
Resiliency
security
biblio
GeneWave: Fast authentication and key agreement on commodity mobile devices
Submitted by K_Hooper on Wed, 01/10/2018 - 11:09am
Acoustic Fingerprints
Acoustics
authentication
composability
Device-to-device communication
encoding
frequency-domain analysis
Hardware
Human behavior
Mobile handsets
pubcrawl
Resiliency
biblio
Characterization of failure dynamics in SDN controllers
Submitted by grigby1 on Thu, 12/28/2017 - 1:37pm
Software
network performance
physical network infrastructure
Policy-Governed Secure Collaboration
pubcrawl
Resiliency
Scalability
Science of Security
SDN controller
network applications
software ageing
software defined networking
software reliability
software reliability growth
Stochastic Activity Networks
Stochastic processes
telecommunication control
controller steady state availability
collaboration
commercial controller implementations
composability
Computational modeling
Computer bugs
control plane logic
controller failure modes
controller outages
aging
failure analysis
failure dynamics
Hardware
Human behavior
Human Factors
hypothetical controller
Metrics
biblio
On Dependability, Cost and Security Trade-Off in Cloud Data Centers
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
Fault tolerant systems
security of data
security
Resiliency
redundant resource usage
pubcrawl
priority of service requests
malicious fault
malicious attack
maintenance engineering
intrusion tolerance
Hardware
BFT
fault tolerance
dependability metric
dependability
data center
cost of service deployment
cost
computer centres
composability
cloud data centers
Cloud Computing
Byzantine Fault Tolerance
biblio
Meeting the Challenges of Critical and Extreme Dependability and Security
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
intrusion tolerance
ultra-resilient components
Telecommunications
sophisticated targeted attacks
Software
security of data
security
Resiliency
resilience
pubcrawl
Protocols
Advanced and persistent threats
Hardware
fault and intrusion tolerance
extreme security risks
extreme computing
dependability risks
composability
APT
Algorithm design and analysis
advanced persistent threats
biblio
Further refinements to the foundations of cyber zone defense
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
Adaptation models
Biological system modeling
composability
computer security
Hardware
intrusion tolerance
Mathematical model
modeling
Predictive models
pubcrawl
Resiliency
security
simulation
biblio
Efficient Hybrid Encryption System Based on Block Cipher and Chaos Generator
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
hybrid cryptosystem
video signal processing
video encryption
Symmetric Key Cryptography
Streaming media
Security analysis
Resiliency
real-time systems
pubcrawl
Multimedia systems
multimedia data
multimedia content
Metrics
hybrid video cryptosystem
hybrid encryption system
advanced encryption standard
high initial-value sensitivity
Hardware performance analysis
Hardware
encryption
CTR mode
Cryptography
composability
chaotic cryptography
chaos generators
chaos generator
Block Cipher
Algorithm design and analysis
AES
biblio
Hardware-Secured Configuration and Two-Layer Attestation Architecture for Smart Sensors
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
secured storage
configuration interface
configuration updates
dedicated secured hardware
Hardware Security
hardware-secured configuration
Intelligent sensors
Secure storage
secured configuration protocol
configuration
security updates
Smart Sensor
smart sensors
two-layer attestation architecture
two-layer configuration attestation process
usability
sensor security
composability
Metrics
attestation
pubcrawl
Resiliency
Human behavior
Human Factors
Internet of Things
Software Architecture
security
Protocols
security of data
Hardware
computer architecture
telecommunication security
wireless sensor networks
confidential configuration data
biblio
Independent source architecture for developing FPGA-based physical layer security techniques
Submitted by grigby1 on Wed, 12/20/2017 - 12:59pm
Bit error rate
signal processing security
Wireless communication
software defined radio
Receivers
random number generation
Physical layer
field programmable gate arrays
Communication Systems Security
Metrics
Generators
Hardware
encryption
Software
composability
privacy
Resiliency
pubcrawl
« first
‹ previous
…
53
54
55
56
57
58
59
60
61
…
next ›
last »