Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
On Preventing SAT Attack with Decoy Key-Inputs
Submitted by aekwall on Fri, 02/25/2022 - 10:44am
logic locking
Very large scale integration
Switches
supply chains
SAT attack
Resistance
Resiliency
pubcrawl
provable security
Predictive Metrics
overproduction
Tamper resistance
ip protection
intellectual property
Hardware Security
design-for-trust
control systems
computer architecture
Compositionality
Human Factors
Metrics
Scalability
biblio
Formal Verification of Secure Forwarding Protocols
Submitted by grigby1 on Thu, 02/24/2022 - 12:31pm
Network-Security
Veins
Security-Protocols
pubcrawl
protocol verification
Protocols
privacy
policy-based collaboration
parametrized-verification
network topology
authentication
Isabelle/HOL
Formal-Verification
data-plane
computer architecture
Compositionality
composability
collaboration
autonomous systems
authorization
biblio
An I/O Separation Model for Formal Verification of Kernel Implementations
Submitted by grigby1 on Thu, 02/24/2022 - 12:19pm
i-o systems security
access control and authorization
authorization
Computational modeling
computer architecture
Hardware
Human behavior
I/O separation
performance evaluation
privacy
Privacy Policies
pubcrawl
Scalability
security
Security architectures
Trustworthy Computing
biblio
Developing Computer Applications without any OS or Kernel in a Multi-core Architecture
Submitted by grigby1 on Tue, 02/22/2022 - 1:42pm
Bare Machine Computing
computer architecture
pubcrawl
Metrics
UDP
Multicore processing
codes
operating system security
multicore
Web servers
Web server
multicore computing security
resilience
Resiliency
Scalability
process control
Prototypes
architecture
biblio
Performance Portability of an SpMV Kernel Across Scientific Computing and Data Science Applications
Submitted by grigby1 on Tue, 02/22/2022 - 1:41pm
Multicore processing
SpMV
sparse matrix operations
scientific computing
Scalability
Runtime
Resiliency
resilience
pubcrawl
performance portability
Scientific Computing Security
multicore computing security
graphics processing units
graph computations
computer architecture
Computational modeling
codes
Metrics
Compositionality
biblio
A Study on the Effect of Hardware Trojans in the Performance of Network on Chip Architectures
Submitted by grigby1 on Tue, 02/22/2022 - 1:41pm
Network on Chip (NoC)
Tiled Chip Multicore Processors (TCMP)
taxonomy
System performance
Scalability
Resiliency
resilience
pubcrawl
Program processors
network on chip security
Multicore processing
multicore computing security
multicore
Metrics
Hardware Trojans (HT)
Globalization
electronics industry
computer architecture
biblio
DHT-PDP: A Distributed Hash Table based Provable Data Possession Mechanism in Cloud Storage
Submitted by grigby1 on Thu, 02/10/2022 - 3:18pm
public auditing
Protocols
privacy
Peer-to-peer computing
outsourced data storage
information technology
distributed hash table
Distributed databases
data privacy
computer architecture
Cloud Computing
biblio
A Comprehensive Survey on Vehicular Ad Hoc Networks (VANETs)
Submitted by grigby1 on Tue, 02/08/2022 - 11:41am
Compositionality
vehicular ad hoc network
Security and privacy VANET
Intelligent Transportation System
challenge
Computer applications
manet privacy
vehicular ad hoc networks
Transportation
computer architecture
composability
standards
privacy
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Intrusion Detection in VANETs
Submitted by aekwall on Mon, 02/07/2022 - 5:10pm
Attacks on VANET
Compositionality
computer architecture
IDS
Intrusion Detection
intrusion detection system
MANET Attack Detection
Metrics
pubcrawl
Reliability
Resiliency
security
Training data
VANET Security
vehicular ad hoc networks
wireless networks
biblio
TrustZone Based Virtual Architecture of Power Intelligent Terminal
Submitted by grigby1 on Mon, 02/07/2022 - 4:45pm
real-time systems
Microelectronics Security
virtual architecture
power IoT terminal
Embedded System
Microelectronics
TrustZone
Systems architecture
Virtualization
computer architecture
composability
Wireless communication
Resiliency
resilience
Metrics
pubcrawl
security
Internet of Things
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »