Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Scalable Security
biblio
Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data : Towards End-to-End Security in IoT Systems
Submitted by grigby1 on Mon, 02/17/2020 - 5:05pm
scalable infrastructures
machine learning
modelling security data
Monitoring
Probes
pubcrawl
Scalability
scalable data collection infrastructure
scalable end-to-end collection
leverage machine learning
Scalable Security
security
security analytics
security data collection systems
security data modelling
security scalability
towards end-to-rnd security
deep learning techniques
complex IoT deployments
Compositionality
computer architecture
computer network security
configurable data collection infrastructure
configurable end-to-end collection
Data collection
data-driven IoT security
collecting processing security-related datasets
effective security analytics algorithms
Internet of Things
IoT platforms
IoT security
IoT security data
IoT systems
learning (artificial intelligence)
biblio
A Security Architecture for RISC-V based IoT Devices
Submitted by aekwall on Mon, 02/10/2020 - 11:43am
small and medium-sized enterprises
RISC-V
RISC-V based IoT devices
RISC-V ISA
Scalability
scalable computing subsystem
Scalable Security
Secure Boot
secure deployment
security architecture
security concept
SIP
Resiliency
small-to-medium enterprises
SME
Software
strict power constraints
system-in-package
system-on-chip
three dimensional system-in-package
Universal Sensor Platform SoC
USeP SoC
watchdog timer
Internet of Things
authenticated watchdog timer
automation
composability
core security features
Cryptography
customizable Internet of Things platform
Device Security
embedded devices
Fraunhofer Institutes
Hardware
3D-SiP
IoT
IoT applications
IoT market
medium security level
Microelectronics Security
Monitoring
p
Predictive Metrics
pubcrawl
reduced instruction set computing
biblio
Towards Scalable and Private Industrial Blockchains
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
blockchain security
hyperledger
privacy
private blockchain
pubcrawl
Scalability
scalable
Scalable Security
security
biblio
Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
actively-secure
Computation
pubcrawl
Scalability
scalable
Scalable Security
security
biblio
Evaluating Quality of Security Testing of the JDK
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
Mutation testing
pubcrawl
Scalability
scalable
Scalable Security
security
biblio
Achieving Secure and Differentially Private Computations in Multiparty Settings
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
privacy
security
Secure computation
Scalable Security
scalable
Scalability
Regression
pubcrawl
Protocols
Computational modeling
Predictive models
multiparty
linear regression
distributed differential privacy
Distributed databases
differential privacy
data privacy
biblio
Melody: Synthesized datasets for evaluating intrusion detection systems for the smart grid
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
emulation
Intrusion Detection
Power measurement
process control
pubcrawl
Scalability
scalable
Scalable Security
security
Smart Grids
Topology
Training
biblio
A scalable and secure key distribution scheme for group signature based authentication in VANET
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
authentication
group signature
Key Distribution
privacy
Protocols
pubcrawl
Public key
Roads
Scalability
scalable
Scalable Security
security
Ubiquitous Computing Security
VANETs
vehicular ad hoc networks
biblio
Implementation of a scalable real time canny edge detector on programmable SOC
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
Algorithm design and analysis
Canny edge detection
computer vision
Detectors
field programmable gate arrays
FPGA based acceleration
Hardware
Image edge detection
pubcrawl
PYNQ-Z1
real-time systems
Scalability
scalable
Scalable Security
security
Streaming media
biblio
A policy-based identity management schema for managing accesses in clouds
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
Access Control
authentication
Cloud Computing
Computational modeling
Identity management
Policy
Policy Mapping
pubcrawl
Reliability
Scalability
scalable
Scalable Security
security
Servers
user authentication
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »