Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Nonvolatile memory
biblio
Efficient Split Counter Mode Encryption for NVM
Submitted by grigby1 on Thu, 05/05/2022 - 3:13pm
encryption
pubcrawl
resilience
Resiliency
Software
optimization
composability
Memory management
Performance analysis
cyber physical systems
cyber physical system security framework
Limiting
Nonvolatile memory
efficient encryption
biblio
A Write-Friendly and Fast-Recovery Scheme for Security Metadata in Non-Volatile Memories
Submitted by grigby1 on Tue, 03/22/2022 - 1:45pm
pubcrawl
resilience
Resiliency
metadata
Memory management
energy consumption
Random access memory
System performance
Computer crashes
integrity tree
Nonvolatile memory
NVM
System recovery
biblio
Trust is the Cure to Distributed Consensus with Adversaries
Submitted by grigby1 on Fri, 06/19/2020 - 11:49am
resilience
Iterative methods
Nonvolatile memory
optimisation
policy-based governance
Policy-Governed Secure Collaboration
Power supplies
Program processors
pubcrawl
Hardware
Resiliency
Scalability
social engineering networked systems
Task Analysis
trust evaluation mechanism
trust graph model
trust propagation scheme
trust-aware consensus algorithm
decision theory
composability
Computer Theory and Trust
access protocols
Byzantine adversary detection
computer science
consensus iteration process
Decision Making
decision making problem
Compositionality
distributed consensus algorithm
distributed consensus problems
distributed optimization
economic engineering networked systems
energy harvesting
false trust
graph theory
biblio
Hiding the Long Latency of Persist Barriers Using Speculative Execution
Submitted by grigby1 on Wed, 05/09/2018 - 2:56pm
resilience
nonvolatile memory technology
NVMM
pcommit
performance bottleneck
performance overhead
persist barriers
persistence instructions
policy-based governance
Policy-Governed Secure Collaboration
pubcrawl
Random access memory
random-access storage
Nonvolatile memory
Resiliency
Safe Coding
Safety
significant execution time overhead
Software
speculative execution
Speculative Persistence
speculative persistence architecture
storage management
substantial performance boost
volatile caches
fail-safe code
checkpoint-based processing
checkpointing
clflushopt
clwb
collaboration
common data structures
consistent state
data structures
DRAM
DRAM chips
expensive fence operations
cache storage
Failure Safety
file system
Force
Human Factors
logging based transactions
long latency persistency operations
Metrics
modern systems reorder memory operations
non-volatile main memory
nonpersistent implementations
NonVolatile Main Memory
biblio
Challenges of emerging memory and memristor based circuits: Nonvolatile logics, IoT security, deep learning and neuromorphic computing
Submitted by K_Hooper on Wed, 02/14/2018 - 11:59am
Artificial Intelligence
artificial intelligence security
Artificial Neural Networks
Energy Efficiency
Human behavior
Metrics
Nonvolatile memory
Program processors
pubcrawl
Random access memory
Resiliency
Scalability
security
Very large scale integration
biblio
New clone-detection approach for RFID-based supply chains
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
radiofrequency identification
telecommunication security
tag tracing
supply chains
supply chain partners
Servers
security issues
RFIDs
RFID-based supply chains
RFID technology
RFID tags
RFID tag
RFID monitoring schemes
RFID
Resiliency
authentication
radio-frequency identification
pubcrawl
NVM
Nonvolatile memory
low-cost wireless method
Human Factors
Human behavior
encoded local database
Databases
counterfeit product injection detection
Cloning
clone-detection approach
back-end database
biblio
Performing an APT Investigation: Using People-Process-Technology-Strategy Model in Digital Triage Forensics
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
digital forensic practitioner
Random access memory
pubcrawl170109
PPTS model
Plugs
people-process-technology-strategy model
Nonvolatile memory
golden triangle components
evidence dynamics identification
digital triage forensics
Digital Forensics
advanced persistent threat
digital evidence
digital data
cyberspace battle
cybercrime investigation
cyberattacks
cyber security incident
Computers
Computer crime
auditing logs
APT
biblio
"Performing an APT Investigation: Using People-Process-Technology-Strategy Model in Digital Triage Forensics"
Submitted by abfox on Tue, 02/14/2017 - 1:25pm
digital forensic practitioner
Random access memory
pubcrawl170101
PPTS model
Plugs
people-process-technology-strategy model
Nonvolatile memory
golden triangle components
evidence dynamics identification
digital triage forensics
Digital Forensics
advanced persistent threat
digital evidence
digital data
cyberspace battle
cybercrime investigation
cyberattacks
cyber security incident
Computers
Computer crime
auditing logs
APT