Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trustworthy Systems
biblio
Lateral Thinking for Trustworthy Apps
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
pubcrawl
Trustworthy Systems
trustworthy apps
Trusted Computing
trusted component ecosystem
Substrates
security technologies
security of data
Secure System Design
Resiliency
composability
lateral thinking
Kernel
Isolation technology
Hardware
cyber physical systems
Cryptography
critical infrastructures
critical infrastructure
biblio
A two-layer network Orchestrator offering trustworthy connectivity to a ROS-industrial application
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
production engineering computing
Trustworthy Systems
trustworthy network
trustworthy connectivity
Trusted Computing
to-end Ethernet flows
Three-dimensional displays
Service robots
ROS-industrial application
ROS-I
ROS
robotic operating system industrial distributed application
Robot sensing systems
Resiliency
Reliability
pubcrawl
composability
orchestrated two-layer network test-bed
Optical fiber networks
operating systems (computers)
network orchestrator
Local area networks
industrial robots
industrial robotics
fiber outage
end-to-end flow services
data transfer
data exchange
cyber physical systems
control engineering computing
computer network security
biblio
Improved trustworthiness judgment in open networks
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
Reliability
wireless sensor networks
uncertainty analysis
uncertainty
Trustworthy Systems
trustworthiness judgment
Trusted Computing
trust model
trust data
statistical trust value
statistical analysis
Software
security of data
Resiliency
collaboration
recommender systems
pubcrawl
Peer-to-peer computing
open systems
open networks
interactive success rate
Decision Making
cyber physical systems
Computational modeling
composability
collaborative recommendation mechanism
Collaborative recommendation
biblio
Trustworthy Services Built on Event-Based Probing for Layered Defense
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
Memory management
watchdogs
VMI
Virtual machine monitors
virtual appliance
Trustworthy Systems
trustworthy services
trustworthy logging
Trusted Computing
system monitoring
system hangs
Resiliency
Registers
pubcrawl
Probes
Monitoring
Attack detection
layered defense
Intrusion Detection
IDS
hypervisor
Hardware
guest-system-call events
feature extraction
event-based probing
defense-in-depth
cyber physical systems
composability
cloud-tuned intrusion detection system
cloud computing environments
Cloud Computing
biblio
Trustworthy reconfigurable access to on-chip infrastructure
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
security
reconfigurable scan network
reconfigurable scan networks
Registers
Resiliency
RSN
scan pattern generation method
secure DFT
secure pattern retargeting
pubcrawl
security problem
system-on-chip
trustworthiness
trustworthy access pattern generation
trustworthy access sequences
trustworthy data transmission
trustworthy reconfigurable access
Trustworthy Systems
IEEE Std 1500
composability
cyber physical systems
data communication
embedded systems
external interfaces
Hardware Security
IEEE standards
IEEE Std 1149
access mechanisms
IEEE Std 1687
IJTAG
Instruments
integrated circuit testing
JTAG
Latches
Multiplexing
on-chip embedded infrastructure
biblio
Data centric trust evaluation and prediction framework for IOT
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
Experience
Trustworthy Systems
standardization
Resiliency
reputation
pubcrawl
Numerical models
Measurement
Knowledge
collaborative filtering
Ensemble Learning
Decision Making
data trust
Data models
cyber physical systems
Computational modeling
composability
biblio
Protecting Outsourced Data in Semi-Trustworthy Cloud: A Hierarchical System
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
organisational aspects
usability goal
Trustworthy Systems
third-party services
storage service providers
SSP
semitrustworthy cloud
Semi-trustworthy storage
Security Goal
scalable data storage services
scalable data sharing services
Resiliency
pubcrawl
privacy data management system
outsourcing
outsourced data protection
Access Control
Memory
hierarchical system
hierarchical access control
HAC-DMS
encryption
decryption keys
Data protection
data outsourcing
data confidentiality
cyber physical systems
Cryptography
composability
Cloud Computing
authorisation
attribute based encryption
biblio
RASSS: A perfidy-aware protocol for designing trustworthy distributed systems
Submitted by grigby1 on Fri, 02/02/2018 - 1:28pm
composability
Cryptography
cyber physical systems
Decoding
Hardware
Protocols
pubcrawl
Reed-Solomon codes
Resiliency
Trustworthy Systems
biblio
Trustworthy design architecture: Cyber-physical system
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
security patch updates
integrated circuits
physical characteristics
physical component
physically verifiable whitelists
pubcrawl
Resiliency
Resilient Security Architectures
Security Operations Center
Industries
Software
system dependencies
TDA
Trustworthy design architecture
Trustworthy Systems
unclonable digital identity
unique system engineering technique
whitelisted system
cyber identities
authentication
computer architecture
Computer crime
conceptual system engineering framework
conventional cyber defenses
costly functional impact tests
CPS
critical infrastructures
Cyber Dependencies
cyber risks
cyber-physical systems
cyber-physical traits
defense
digital characteristics
digital commands
digitally unclonable function
« first
‹ previous
1
2
3
4
5