Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Predictive Metrics
biblio
Formal Security Verification of Concurrent Firmware in SoCs Using Instruction-Level Abstraction for Hardware*
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
resilience
Metrics
microprocessor chips
Microprogramming
multi-threading
multithreaded program verification problem
Predictive Metrics
program verification
pubcrawl
intellectual property security
Resiliency
Secure Boot design
security of data
SoC security verification
software verification techniques
system-on-chip
Systems-on-Chip
cyber-physical systems
architecture level
bit-precise reasoning
cognition
composability
Concurrency
concurrency (computers)
concurrent firmware
cyber-physical system
Access Control
firmware
firmware-visible behavior
formal security verification
Frequency modulation
Hardware
Instruction-Level Abstraction
intellectual property blocks
biblio
UFO: Predictive Concurrency Use-After-Free Detection
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
security of data
program diagnostics
program operating
provably higher detection capability
pubcrawl
rare thread schedules
resilience
Resiliency
Schedules
scheduling
program debugging
single observed execution trace
tools
UAF
UAF detection
UAF vulnerabilities
UFO
UFO scales
use-after-free vulnerabilities
vulnerabilities
cyber-physical system
Chromium
common attack vectors
composability
Concurrency
concurrency UAF
concurrency use-after-free detection
Concurrent computing
concurrent programs
critical software systems
Browsers
cyber-physical systems
encoding
extended maximal thread causality model
Instruction sets
larger thread scheduling space
Metrics
multi-threading
multithreaded execution trace
Predictive Metrics
biblio
IoT Security Model and Performance Evaluation: A Blockchain Approach
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
model construction
Throughput
theoretical data support
System performance
security risks
security problems
security of data
security model
Resiliency
resilience
Public key
pubcrawl
Predictive Metrics
performance evaluation
Packaging
blockchain
Metrics
IoT security model
InterPlanetary File System
Internet of Things
distributed large capacity storage
cyber-physical systems
cyber-physical system
Cryptography
concurrency (computers)
Concurrency
composability
blockchain-based security model
blockchain technology
biblio
OWL: Understanding and Detecting Concurrency Attacks
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
Computer bugs
Predictive Metrics
Concurrency
Software Testing
single-threaded programs
OWL source code
OWL
knowledge representation languages
concurrency bug detectors
concurrency attack exploit scripts
Concurrency Attack
bug-inducing inputs
Concurrent computing
concurrency control
security
cyber-physical system
cyber-physical systems
Instruction sets
program debugging
public domain software
Linux
composability
Resiliency
Metrics
pubcrawl
resilience
tools
biblio
Concurrency Strategies for Attack Graph Generation
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
pubcrawl
Multi-threaded Programming
network attack graph
network security
network state space
OpenMP
OpenMP-based programming implementation
parallel algorithms
Predictive Metrics
Metrics
resilience
Resiliency
Scalability
scalable attack graphs
security of data
storage costs
storage management
telecommunication security
Concurrent computing
security
attack graph
attack graph generation
attack graphs
composability
Computational modeling
concurrency control
concurrency strategies
Concurrency
cyber-physical system
cyber-physical systems
cyberphysical
Generators
graph theory
Instruction sets
large-scale graph
message passing
biblio
Fair Leader Election for Rational Agents in Asynchronous Rings and Networks
Submitted by aekwall on Mon, 12/09/2019 - 12:16pm
asynchronous unidirectional ring
Computing Theory and Resilience
fair coin toss
fair leader election
game theoretic security
Human Factors
Predictive Metrics
pubcrawl
rational distributed agents
Resiliency
Scalability
biblio
Secure Physical Layer Network Coding versus Secure Network Coding
Submitted by grigby1 on Thu, 12/05/2019 - 10:47am
Physical layer
telecommunication security
Task Analysis
Silicon
security
secure physical layer network coding
secure communication
secrecy analysis
Resiliency
resilience
Receivers
pubcrawl
Predictive Metrics
physical layer security
coding theory
noisy channel
noiseless network
Noise measurement
network coding
Metrics
forward error correction
error correction codes
error correction
cyber physical systems
Cryptography
computation and forward
Compositionality
composability
biblio
A Delayed Feedback Chaotic Encryption Algorithm Based on Polar Codes
Submitted by aekwall on Mon, 11/25/2019 - 2:10pm
channel coding
polar codes
physical layer security
encoding information protection
delayed feedback chaotic encryption algorithm
delayed feedback
data transmission security
chaotic sequences
binary keys extraction
chaotic cryptography
cryptanalysis
chaotic system
wireless channels
security of data
chaotic communication
chaos
Predictive Metrics
Reliability
feedback
Wireless communication
Communication system security
composability
pubcrawl
Resiliency
encryption
Cryptography
biblio
Secure speech communication system based on scrambling and masking by chaotic maps
Submitted by aekwall on Mon, 11/25/2019 - 2:09pm
chaotic encryption
two encryption levels
SSSNR
speech processing
signal denoising
secure speech communication system
scrambling
public channels
MatLab simulation
masking
communication security
Chaotic systems
chaotic scrambling and masking
chaotic scrambling
chaotic masking
Chaotic maps
Cryptography
channel problems
Transmitters
chaotic cryptography
chaotic communication
Predictive Metrics
Synchronization
synchronisation
composability
pubcrawl
Resiliency
information security
telecommunication security
Receivers
encryption
biblio
Chaos-based Cryptography for Transmitting Multimedia Data over Public Channels
Submitted by aekwall on Mon, 11/25/2019 - 2:09pm
Lyapunov-based adaptive technique
Transmitters
time series
telecommunication channels
Resiliency
Receivers
public communication channel
pubcrawl
Predictive Metrics
Oscillators
network security
multiple chaotic orbits
multimedia signals
multimedia data
Multimedia communication
chaotic cryptography
Lyapunov methods
internet
Encryption technique
Cryptography
crypto-analysis methods
composability
Communication channels
chaotic nonautonomous Duffing oscillator
chaotic communication
chaos-based cryptography
chaos
bandwidth allocation
adaptive signal processing
8-bit ASCII code
« first
‹ previous
…
43
44
45
46
47
48
49
50
51
…
next ›
last »