Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks
Submitted by BrandonB on Tue, 05/05/2015 - 10:29am
ordered hierarchy
Virtual machine monitors
user-level applications
System software
supervisory programs
storage management
security of data
processor architecture
privileged system software
privilege level
permission mechanism
Permission
performance overhead
arbitrary malicious activities
operating systems
noninclusive memory permissions architecture
modern computer system protection
modern commodity systems
Memory management
hypervisor code
high-privileged software layer
hardware-supported page permission scheme
hardware complexity
Hardware
cross-layer attack protection
complex software stack protection
biblio
Datacenter Applications in Virtualized Networks: A Cross-Layer Performance Study
Submitted by BrandonB on Tue, 05/05/2015 - 10:23am
network virtualization
virtualized networks
Virtualization
virtualisation
software-defined networking
software radio
software defined networking overlays
Servers
Protocols
overlay networks
overlay network
Cloud Computing
IP networks
Hardware
Encapsulation
delays
datacenter workloads
datacenter networks
datacenter applications
cross layer performance study
cross layer hybrid mesoscale simulation platform
computer centres
biblio
OpenSSL HeartBleed: Security Management of Implements of Basic Protocols
Submitted by BrandonB on Tue, 05/05/2015 - 10:14am
information security management
software facilities
Software
security threats
secure socket layer
Protocols
OpenSSL security
OpenSSL HeartBleed
information technology
Computers
information security
hierarchical structure
Heart beat
hardware facilities
Hardware
Cryptographic Protocols
cross-layer security management
biblio
Cross-layer security framework for smart grid: Physical security layer
Submitted by BrandonB on Tue, 05/05/2015 - 10:13am
physical layer security
Trojan horses
smart power grids
smart power grid cyber technology
Smart Grids
smart grid security
Smart Grid
process control system
Process Control Security
process control
predictive control
power system security
physical security layer
conceptual layering model
PCS
Monitoring
isolated security tool
Hidden Markov models
hardware Trojan threat
Hardware
CyNetPhy PSL resolution
cross-layer security framework
Cross-Layer Security
cooperative real-time security system
control systems
biblio
Challenges with Transition and User Accounting in Next Generation Networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:58am
Hardware
internet
IP networks
IPv4
IPv6
Monitoring
network administrators
network control protocol
next generation networks
Organizations
Probes
Protocols
recursive inter network architecture
TCP/IP
user accounting
biblio
Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG
Submitted by BrandonB on Tue, 05/05/2015 - 9:54am
random number generator
Whirlwind RNG
VM snapshots
VM boots
virtualized Linux
virtualized environments
Virtualization
virtual machines
virtual machine
software-based random number generators
cryptographic secrets
not-so-random numbers
Linux RNG systems
Linux
Kernel
Instruments
Hardware
entropy sources
Entropy
Cryptography
biblio
Dissecting On-Node Memory Access Performance: A Semantic Approach
Submitted by BrandonB on Mon, 05/04/2015 - 2:42pm
memory behaviour
Topology
storage management
Semantics
semantic approach
sampling-based performance measurement units
sampled memory accesses
Program processors
power efficiency
PMU
performance ramifications
on-node memory access performance
multithreading
multi-threading
attribute semantic information
memory access optimization
Libraries
Kernel
Hardware
fine-grained memory access performance data
domain decomposition
distributed memory systems
design decisions
data objects
data motion
CPU manufacturers
Context
code regions
biblio
Protecting and Identifiying Smartphone Apps Using Icmetrics
Submitted by BrandonB on Mon, 05/04/2015 - 1:12pm
Humanoid robots
Web-server spoofing
software programs
Software
smartphone application protection
smartphone application identification
smart phones
security
Mobile Security
identifier generation
ICmetrics
Android apps
hardware programs
Hardware
fraud identification
feature extraction
encryption key generation
encryption
Cryptography
biometrics
Androids
Android security
biblio
Trusted Platform Module for Smart Cards
Submitted by BrandonB on Fri, 05/01/2015 - 9:09am
near-field communication
User Centric Tamper-Resistant Device
user centric smart card ownership model
UCTD
UCOM
trusted service manager
Trusted Platform Module
Trusted Execution Environment
TEE
smart cards
security
Runtime
privacy preservation platforms
off-card trusted relationship
application provider
near field communication-based mobile phone services
multiapplication smart card initiative
Mobile handsets
Mobile communication
Hardware
global platform consumer centric model
embedded devices
deployment model
data privacy
cross-device security
computer architecture
Computational modeling
biblio
A novel architecture for identity management system using virtual appliance technology
Submitted by BrandonB on Thu, 04/30/2015 - 2:25pm
identity management systems
Virtualization
Virtual machining
virtual machines
virtual machine monitor platform
virtual appliance technology
virtual appliance
third party cloud
Servers
security of data
information security
computer architecture
Identity management system architecture
identity management system
Identity management
Home appliances
Hardware
green computing practices
green computing
enterprise based application
cost benefit
« first
‹ previous
…
58
59
60
61
62
63
64
65
66
next ›
last »