Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-physical systems
biblio
Formal Security Verification of Concurrent Firmware in SoCs Using Instruction-Level Abstraction for Hardware*
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
resilience
Metrics
microprocessor chips
Microprogramming
multi-threading
multithreaded program verification problem
Predictive Metrics
program verification
pubcrawl
intellectual property security
Resiliency
Secure Boot design
security of data
SoC security verification
software verification techniques
system-on-chip
Systems-on-Chip
cyber-physical systems
architecture level
bit-precise reasoning
cognition
composability
Concurrency
concurrency (computers)
concurrent firmware
cyber-physical system
Access Control
firmware
firmware-visible behavior
formal security verification
Frequency modulation
Hardware
Instruction-Level Abstraction
intellectual property blocks
biblio
UFO: Predictive Concurrency Use-After-Free Detection
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
security of data
program diagnostics
program operating
provably higher detection capability
pubcrawl
rare thread schedules
resilience
Resiliency
Schedules
scheduling
program debugging
single observed execution trace
tools
UAF
UAF detection
UAF vulnerabilities
UFO
UFO scales
use-after-free vulnerabilities
vulnerabilities
cyber-physical system
Chromium
common attack vectors
composability
Concurrency
concurrency UAF
concurrency use-after-free detection
Concurrent computing
concurrent programs
critical software systems
Browsers
cyber-physical systems
encoding
extended maximal thread causality model
Instruction sets
larger thread scheduling space
Metrics
multi-threading
multithreaded execution trace
Predictive Metrics
biblio
IoT Security Model and Performance Evaluation: A Blockchain Approach
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
model construction
Throughput
theoretical data support
System performance
security risks
security problems
security of data
security model
Resiliency
resilience
Public key
pubcrawl
Predictive Metrics
performance evaluation
Packaging
blockchain
Metrics
IoT security model
InterPlanetary File System
Internet of Things
distributed large capacity storage
cyber-physical systems
cyber-physical system
Cryptography
concurrency (computers)
Concurrency
composability
blockchain-based security model
blockchain technology
biblio
OWL: Understanding and Detecting Concurrency Attacks
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
Computer bugs
Predictive Metrics
Concurrency
Software Testing
single-threaded programs
OWL source code
OWL
knowledge representation languages
concurrency bug detectors
concurrency attack exploit scripts
Concurrency Attack
bug-inducing inputs
Concurrent computing
concurrency control
security
cyber-physical system
cyber-physical systems
Instruction sets
program debugging
public domain software
Linux
composability
Resiliency
Metrics
pubcrawl
resilience
tools
biblio
Concurrency Strategies for Attack Graph Generation
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
pubcrawl
Multi-threaded Programming
network attack graph
network security
network state space
OpenMP
OpenMP-based programming implementation
parallel algorithms
Predictive Metrics
Metrics
resilience
Resiliency
Scalability
scalable attack graphs
security of data
storage costs
storage management
telecommunication security
Concurrent computing
security
attack graph
attack graph generation
attack graphs
composability
Computational modeling
concurrency control
concurrency strategies
Concurrency
cyber-physical system
cyber-physical systems
cyberphysical
Generators
graph theory
Instruction sets
large-scale graph
message passing
biblio
Differential Privacy of Online Distributed Optimization under Adversarial Nodes
Submitted by grigby1 on Mon, 12/16/2019 - 3:53pm
graph theory
sensitive data
Scalability
Resiliency
resilience
regular node
pubcrawl
privacy
preliminary attempt
optimization
online learning
online distributed optimization
network topology
learning (artificial intelligence)
important data information
Human behavior
adversarial
distributed optimization
distributed online learning algorithm
Distributed databases
differential privacy
different adversary models
data privacy
data analysis
cyber-physical systems
cyber physical systems
Cyber Physical System
Control Theory and Privacy
Control Theory
big data analysis methods
Big Data
adversarial nodes
biblio
LEMNA: Explaining Deep Learning Based Security Applications
Submitted by aekwall on Mon, 12/16/2019 - 2:30pm
Internet of Things
cyber-physical systems
pubcrawl
Binary Analysis
resilience
deep recurrent neural networks
explainable AI
controller area network security
biblio
Identity and Access Control for Micro-services Based 5G NFV Platforms
Submitted by aekwall on Mon, 12/16/2019 - 2:30pm
authorization
Internet of Things
cyber-physical systems
pubcrawl
authentication
identity
resilience
5G
DevOps
JSON Web Token
Keycloak
micro-services
network services
NFV MANO
virtual network functions
controller area network security
biblio
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks
Submitted by aekwall on Mon, 12/16/2019 - 2:29pm
controller area network security
cyber-physical systems
Internet of Things
pubcrawl
resilience
biblio
A Brief Look at the Security of DeviceNet Communication in Industrial Control Systems
Submitted by aekwall on Mon, 12/16/2019 - 2:29pm
security
Internet of Things
Industrial Control Systems
cyber-physical systems
pubcrawl
attacks
resilience
DeviceNet
controller area network security
« first
‹ previous
…
43
44
45
46
47
48
49
50
51
…
next ›
last »