Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security protection
biblio
Ensuring Query Completeness in Outsourced Database Using Order-Preserving Encryption
Submitted by aekwall on Mon, 11/16/2020 - 1:10pm
high communication
database service providers
Outsourced Database
Outsourced Database Integrity
business owners
data completeness protecting scheme
data confidentiality protection aspect
data correctness
data integrity protection aspect
database outsourcing
OPE encrypted
ORDER BY
order-preserving encryption
outsourced data secure
query completeness
range queries
widely used encryption scheme
composability
Servers
Cryptography
data owners
encryption
data privacy
data integrity
Resiliency
pubcrawl
Cloud Computing
Metrics
query processing
Databases
Probabilistic logic
database management systems
security protection
outsourcing
biblio
Research on Security Protection of Network Based on Address Layout Randomization from the Perspective of Attackers
Submitted by aekwall on Mon, 10/05/2020 - 11:59am
telecommunication network topology
Dynamic Networks and Security
TCP/IP protocol
space layout randomization system
periodic dynamic hopping
network intruder
internal network address
grid topological structure
address layout randomization
address hoppin
Dynamic scheduling
security protection
Layout
network architecture
IP address
computer network security
Aerospace electronics
Heuristic algorithms
process control
SDN
Metrics
composability
pubcrawl
Resiliency
moving target defense
transport protocols
software defined networking
security
IP networks
biblio
SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors
Submitted by aekwall on Mon, 02/10/2020 - 11:57am
security of data
pubcrawl
Resiliency
SATIN
Scalability
secure introspection mechanism
secure world checking solutions
secure world introspection
security
operating systems (computers)
security policy violations
security protection
Trusted Computing
Trusted Execution Environment
trustworthy asynchronous introspection mechanism
Trustworthy Systems
TrustZone security extension
Mobile handsets
Asynchronous Introspection
composability
cyber physical systems
Evasion Attack
Instruction sets
Kernel
Metrics
microprocessor chips
ARM development board
multicore ARM processors
multicore ARM system
multicore computing security
Multicore processing
multiprocessing systems
normal world snapshot
normal-world evasion attack
biblio
Digital Watermarking for Relational Database Security Using mRMR Based Binary Bat Algorithm
Submitted by aekwall on Mon, 11/04/2019 - 11:22am
mRMR based binary bat algorithm
data protection issues
data tempering attacks
Database-security
deletion attacks
evolutionary computation
evolutionary technique
feature-subset-selection
insertion attacks
data accuracy
mRMR based feature subset selection technique
numerical relational database
relational data
relational database security
reversible watermarking
security protection
watermark creation
security of data
constraints optimization technique
Constraint optimization
binary-bat-algorithm
alteration attacks
relational databases
digital watermarking
Watermarking
Clustering algorithms
Robustness
Metrics
composability
pubcrawl
Human behavior
Resiliency
data integrity
biblio
PUFSec: Protecting physical unclonable functions using hardware isolation-based system security techniques
Submitted by grigby1 on Mon, 06/11/2018 - 3:20pm
physical unclonable function protection
Xilinx SoC
system-on-chip
system security techniques
Software
security protection
security policies
security compromises
security challenges
secure architecture extension
Resiliency
resilience
PUFSec framework
PUF workflow
PUF hardware
pubcrawl
Access Control
Networked Control Systems Security
Monitoring
Modeling Attacks
Metrics
internal PUF design
hardware isolation
Hardware
DoS attacks
Denial of Service attacks
Data protection
control systems
computer network security
computer architecture
composability
ARM Processor
biblio
A security protection approach based on software defined network for inter-area communication in industrial control systems
Submitted by grigby1 on Mon, 06/11/2018 - 3:19pm
interarea communication protection
software defined networking
Software Defined Network (SDN)
Software Defined Network
security protection approach
security protection
security interarea communication architecture
security inspection method
Resiliency
resilience
pubcrawl
production engineering computing
Package Inspection
Networked Control Systems Security
Metrics
attacks propagation prevention
Inter-Area Communication
information entropy
Industrial Control Systems
industrial control
hazards propagation prevention
Hazards
Entropy
deep network behaviors analysis
cyber-attacks detection
customized communication protection technology
control engineering computing
computer network security
composability
biblio
Foresighted Deception in Dynamic Security Games
Submitted by grigby1 on Mon, 04/02/2018 - 12:40pm
optimization
Stochastic processes
stochastic games
stochastic deception game
security protection
security of data
security
SDG
Resiliency
resilience
pubcrawl
policy-based governance
Artificial Neural Networks
myopic deception
Metrics
learning (artificial intelligence)
Iterative methods
iterative algorithm
Information systems
Heuristic algorithms
Games
dynamic security games
Data protection
biblio
Analysis of asymmetric encryption scheme, AA \#x03B2; Performance on Arm Microcontroller
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
Internet of Things
system-on-chip
system on chip
sensors
security protection
security
Scalability
Resiliency
random-access storage
Random access memory
public key cryptography
Public key
pubcrawl
microcontrollers
Metrics
Libraries
AA-Beta
Instruction cache
GNU multiple precision arithmetic library package
encryption
embedded microcontroller
Elliptic curve cryptography
digital arithmetic
Data Cache
Clocks
cache storage
asymmetric encryption scheme
Asymmetric
arm microcontroller
ARM Cortex-M7 microcontroller
AAβ
« first
‹ previous
1
2