Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trustworthy Systems
biblio
Modeling and Verifying Ticket-Based Authentication Scheme for IoT Using CSP
Submitted by grigby1 on Tue, 08/02/2022 - 4:21pm
Analytical models
authentication
CSP
Data models
Data Security
Internet of Things
IoT
Mobile handsets
modeling
pubcrawl
resilience
Resiliency
security
System recovery
Trustworthy Systems
verification
biblio
CMSS: Collaborative Modeling of Safety and Security Requirements for Network Protocols
Submitted by grigby1 on Tue, 08/02/2022 - 4:21pm
5G mobile communication
Analytical models
collaboration
model-driven engineering
network protocol
network topology
Protocols
Prototypes
pubcrawl
Requirement Modeling
resilience
Resiliency
Safety
Safety and Security Requirements
Trustworthy Systems
biblio
Practical Principle of Least Privilege for Secure Embedded Systems
Submitted by grigby1 on Tue, 08/02/2022 - 4:21pm
embedded systems
Resiliency
composability
Metrics
Communication channels
control systems
Linux
pubcrawl
real-time systems
resilience
security
Synchronization
Trustworthy Systems
biblio
Formal Synthesis of Filter Components for Use in Security-Enhancing Architectural Transformations
Submitted by grigby1 on Tue, 08/02/2022 - 4:20pm
Language theoretic security
Trustworthy Systems
tools
Systems architecture
Software algorithms
Software
Resiliency
resilience
pubcrawl
expert systems
Hardware
formal verification
formal synthesis
computer architecture
compiler security
Architecture modeling
privacy
biblio
Applied Cryptography in Network Systems Security for Cyberattack Prevention
Submitted by grigby1 on Tue, 08/02/2022 - 4:20pm
Applied cryptography
Cryptography
encryption
fabrication
Hash functions
Interception
Interruption
modification
network security
pubcrawl
Public key
resilience
Resiliency
RSA
Trustworthy Systems
Virtual private networks
biblio
Formalizing an Architectural Model of a Trustworthy Edge IoT Security Gateway
Submitted by grigby1 on Tue, 08/02/2022 - 4:20pm
computer architecture
Conferences
Costs
Industries
Metals
Productivity
pubcrawl
resilience
Resiliency
Systems architecture
Trustworthy Systems
biblio
Review on Trustworthy Analysis in binary code
Submitted by grigby1 on Tue, 08/02/2022 - 4:20pm
Android application
binary code
Binary codes
deep learning
Learning systems
malware
Medical services
programming
pubcrawl
resilience
Resiliency
Schedules
tools
trustworthy
Trustworthy Systems
biblio
Enhancing Continuous Service of Information Systems Based on Cyber Resilience
Submitted by grigby1 on Wed, 07/13/2022 - 1:17pm
information security
Trustworthy Systems
trust
Systems engineering and theory
security architecture
security
Scalability
Resiliency
resilience measurement
pubcrawl
policy governance
Metrics
Computing Theory
Human behavior
faces
data science
Cyberspace
cybersecurity education
cyber resilience
continuous service
Conferences
composability
collaboration
resilience
biblio
Machine Learning for Threat Recognition in Critical Cyber-Physical Systems
Submitted by grigby1 on Thu, 05/19/2022 - 12:55pm
privacy
Trustworthy Artificial Intelligence
threat vectors
threat assessment
Support vector machines
Stress
risk management
Radio frequency
pubcrawl
Trustworthy Systems
Metrics
machine learning
information management
Healthcare
Cybersecurity
cyber-physical systems
critical infrastructures
Computer crime
biblio
Trustworthy Computing on Untrustworthy and Trojan-Infected on-Chip Interconnects
Submitted by grigby1 on Tue, 03/01/2022 - 4:19pm
Metrics
tagging
system-on-chip
Software
Scalability
Resiliency
resilience
pubcrawl
network on chip security
Trustworthy Systems
IP networks
Hardware Trust
Hardware Security
Hardware
Focusing
Europe
design for security
composability
1
2
3
4
5
next ›
last »