Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
An intelligent honeynet architecture based on software defined security
Submitted by grigby1 on Wed, 12/20/2017 - 12:59pm
security
Metrics
pubcrawl
Resiliency
privacy
composability
Software
Hardware
computer architecture
energy consumption
honeynet
honeypot
network function virtualization
Packet loss
Software Defined Security
signal processing security
biblio
Security sandbox model for modern web environment
Submitted by K_Hooper on Wed, 12/20/2017 - 11:33am
nontrusted applications
Web Browser Security
Web browsers
security Sandbox model
security of data
security
sandbox
Resiliency
pubcrawl
privilege
online front-ends
browser
modern Web environment
Metrics
Kernel
internet
Human behavior
Hardware
filter
browser vulnerabilities
Browsers
biblio
An Integrated Approach for Resilience in Industrial Control Systems
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Information Reuse
Software systems
self-adaptive software system
security
Run Time
Resiliency
resilience
pubcrawl
Monitoring
model-driven engineering techniques
model-driven engineering
meta-adaptive system
Adaptation models
industrial plants
Industrial Control Systems
industrial control system
industrial control
hydropower plant units
hydroelectric power
Hardware
Design Time
controller configurations
contract-based design paradigm
contract-based design
biblio
Evolving side-channel resistant reconfigurable hardware for elliptic curve cryptography
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
Metrics
Xilinx Kintex-7 FPGA
timing attacks
side-channel resistant reconfigurable hardware
side-channel attacks
security-level
Scalability
Resiliency
reconfigurable hardware design
public-key cryptosystems
public key cryptography
pubcrawl
propagation delay minimization
power analysis attacks
noninvasive side channel attacks
minimisation
Algorithm design and analysis
Hardware
genetic algorithms
genetic algorithm
fitness function
field programmable gate arrays
Evolutionary algorithm
Elliptic curves
elliptic curve discrete logarithm
Elliptic curve cryptography
elliptic curve cryptographic hardware
elliptic curve cryptographic combinational logic circuits
Cryptographic Protocols
cryptographic applications
combinational circuits
circuit size minimization
biblio
NSF GENI cloud enabled architecture for distributed scientific computing
Submitted by grigby1 on Mon, 12/04/2017 - 12:58pm
research institute
networking traffic
North Carolina
NSF GENI cloud enabled architecture
Open Resource Control Architecture
operating systems
ORCA based GENI rack
parallel processing
provisioned L2 network domain
pubcrawl
Renaissance Computing Institute
RENCI
networking systems
Resiliency
Scientific Computing Security
scientific information systems
SDN controllers
Servers
software defined networking
software defined networking controllers
United States
virtual laboratory
virtual machines
Global Environment-for-Network Innovations
Cloud Computing
cloud federation
cloud resources
Compositionality
computer architecture
data transfer
distributed resource orchestration system
distributed scientific computing
distributed systems
Fabrics
GENI resources
baremetals
graphical user interfaces
Hardware
high-performance computing
high-throughput computing
HPC
HTC
Internet2 L2 service
L2 network domain
Metrics
National Science Foundation funded program
biblio
Embedded Accelerators for Scientific High-Performance Computing: An Energy Study of OpenCL Gaussian Elimination Workloads
Submitted by grigby1 on Mon, 12/04/2017 - 12:58pm
high-performance supercomputers
ARM processors
Benchmark testing
Supercomputers
Compositionality
CPU
embedded accelerators
embedded systems
Energy Efficiency
Gaussian processes
gpu
graphics processing units
Hardware
high-performance computing
accelerators
HPC
low power devices
Matrices
Metrics
microprocessor chips
OpenCL Gaussian elimination workloads
parallel processing
performance evaluation
power aware computing
pubcrawl
Resiliency
Scientific Computing Security
biblio
A compact and efficient architecture for elliptic curve cryptographic processor
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
heterogeneous function units
word length 576 bit
UMC
size 90 nm
scalar multiplication
Resiliency
Registers
public key cryptography
pubcrawl
parallel processing
Montgomery modular division algorithm
microprocessor chips
Metrics
Kaliski's Montgomery modular inversion
arbitrary curves
hardware complexity
Hardware
Galois fields
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
elliptic curve cryptographic processor
dual-field elliptic curve cryptographic processor
computer architecture
composability
CMOS integrated circuits
CMOS 1 P9M technology
clustering technology
Clustering algorithms
biblio
Transitioning Native Application into Virtual Machine by Using Hardware Virtualization Extensions
Submitted by grigby1 on Mon, 11/20/2017 - 12:31pm
security
operating system service virtualization
Policy
policy-based governance
process maliciousness
process virtual machine
program flow control
pubcrawl
sandbox
sandboxing
operating system kernels
system call virtualization
untrusted application behaviour control
untrusted application behaviour monitoring
virtual machine equivalent isolation
virtual machines
Virtual machining
virtualisation
Virtualization
hardware virtualization extensions
composability
confined malicious application
execution overheads
file system access
Governance
Government
Hardware
Hardware virtualization
code vulnerabilities
isolation
Kernel
kernel operating system
Libraries
Linux
Linux process
Memory management
operating system
biblio
Practical and Secure IoT Device Authentication Using Physical Unclonable Functions
Submitted by grigby1 on Mon, 11/20/2017 - 12:28pm
Internet of Things
tractable cryptographic protocols
tamper resistance solutions
Tamper resistance
secure IoT device authentication
Resiliency
resilience
PUF-based authentication protocol
public key cryptography
pubcrawl
Protocols
private key exposure
private key cryptography
practical IoT device authentication
physical unclonable functions
output mapping
authentication
input mapping
Hardware
Games
elliptic curve-based variant
Elliptic curve cryptography
discrete logarithm problem
digital signatures
digital signature generation
device enrollment
decryption
Cryptography
Cryptographic Protocols
cost-effective tamper resistance
composability
biblio
A highly reliable and tamper-resistant RRAM PUF: Design and experimental validation
Submitted by grigby1 on Mon, 11/20/2017 - 12:28pm
security
resilience
Resiliency
resistive RAM
resistive random access memory
RRAM
RRAM arrays
RRAM PUF instances
RRAM PUF properties
RRAM PUF resistance
Reliability
self-destructive feature
split reference
split S/A
split sense amplifier
Tamper resistance
tamper-resistant design
tamper-resistant RRAM PUF
top-level interconnect
uniqueness
invasive tampering
Decoding
dummy cells
extrapolation
Hardware
hardware overhead
Hardware Security
HD
inter-Hamming distance
interconnect layers
composability
layout obfuscation
layout obfuscation scheme
Logic arrays
multiple RRAM cells
Physical Unclonable Function
pubcrawl
PUF
relaxing transistor
« first
‹ previous
…
54
55
56
57
58
59
60
61
62
…
next ›
last »