Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
Towards a Security Architecture for Protecting Connected Vehicles from Malware
Submitted by grigby1 on Fri, 08/28/2020 - 11:51am
Metrics
virtualisation
vehicle malware
vehicle ECUs
unexpected consequences
security architecture
security
Scalability
Resiliency
resilience
real-time operating system
pubcrawl
operating systems (computers)
operating systems
noncritical functionalities
mobile radio
attack surface
malware
life-threatening activities
invasive software
internet
infotainment system
control engineering computing
control critical vehicle functionalities
connected vehicles
connected vehicle software
computer architecture
automotive electronics
automobiles
automobile industry
attackers
biblio
Decentralized Attestation of Conceptual Models Using the Ethereum Blockchain
Submitted by aekwall on Mon, 08/17/2020 - 11:36am
Ethereum blockchain
software connector
globally unique identifiers
existence proofs
Ethereum account
Decentralized Identifiers
decentralized attestation methods
cryptographic verification
Conceptual Modeling
blockchain-based attestation
ADOxx metamodeling platform
distributed ledger
Hash functions
Cryptography
certification
ethereum
smart contracts
Distributed databases
blockchain
composability
pubcrawl
Human behavior
Resiliency
computer architecture
attestation
biblio
SACHa: Self-Attestation of Configurable Hardware
Submitted by aekwall on Mon, 08/17/2020 - 11:36am
hardware-software system
tamper-resistant hardware module
Software
self-attestation
SACHa
Resiliency
remote attacks
Read only memory
pubcrawl
Protocols
physical attacks
Microprocessors
intended application code
Human behavior
attestation
hardware-based attestation
Hardware
FPGAs
Field-Programmable Gate Arrays
field programmable gate arrays
embedded systems
embedded software
embedded device
device attestation
configurable hardware
configurable FPGA hardware
computer architecture
composability
biblio
Comparing Performances of Cypress Block Cipher and Modern Lighweight Block Ciphers on Different Platforms
Submitted by aekwall on Mon, 08/10/2020 - 10:32am
Cypress-256
Windows x32
Scalability
Resiliency
pubcrawl
Microsoft Windows (operating systems)
Metrics
Linux
lighweight block ciphers
lightweight cryptography
Humanoid robots
Human behavior
encryption speed
encryption
composability
Cypress block cipher
Cryptography
computer architecture
Ciphers
block cipher Cypress
Androids
android encryption
Android (operating system)
android
64-bit Linux
Linux Operating System Security
Predictive Metrics
biblio
Situation Aware Intrusion Detection System Design for Industrial IoT Gateways
Submitted by grigby1 on Thu, 07/30/2020 - 2:15pm
Resiliency
internetworking
IoT platform providers
IoT security
Logic gates
Metrics
Peer-to-peer computing
production engineering computing
Protocols
pubcrawl
resilience
Internet of Things
resilient services
security
security attacks
security measures
security services
sensors
situation aware intrusion detection system design
standard IIoT gateways
system services
cyber-attacks
Cloud Computing
composability
Compositionality
computational intelligence
computer architecture
computer network security
constrained IIoT gateways
consumer IoT segment
cyber security threat
Cryptography
Data protection
edge node
enterprise attackers
Human behavior
Human Factors
IIoT world
industrial IoT domain
Industrial IoT Gateway
industrial IoT gateways
biblio
A Pull-Type Security Patch Management of an Intrusion Tolerant System Under a Periodic Vulnerability Checking Strategy
Submitted by aekwall on Mon, 07/27/2020 - 12:13pm
stochastic reward net
vulnerability checking
System Availability
stochastic model
reactive defense strategies
pull-type security patch management
phase-type approximation.
phase-type approximation
Markov regenerative process models
intrusion tolerant system
Intrusion tolerance system
composite stochastic reward net
intrusion tolerance
security of data
security patch management
pull-type patch management
periodic vulnerability checking strategy
interval availability
Markov processes
maintenance engineering
computer security
composability
pubcrawl
Resiliency
computer architecture
Servers
biblio
Intrusion-Tolerant Autonomous Driving
Submitted by aekwall on Mon, 07/27/2020 - 12:11pm
Sophisticated Attacks
intrusion tolerance
well equipped adversarial teams
real time systems
predictable hardware
killer application
intrusion-tolerant autonomous driving
intrusion-tolerant architecture
intrusion tolerant design
highly skilled equipped adversarial teams
fault-and-intrusion tolerance toolboxes
fault and intrusion tolerance
complex software
real-time systems
automobiles
Autonomous Driving
distributed systems
fault tolerant computing
composability
pubcrawl
Resiliency
computer architecture
Kernel
Task Analysis
traffic engineering computing
security of data
Safety
autonomous vehicles
biblio
An efficient KP-ABE scheme for content protection in Information-Centric Networking
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
KP-ABE
fast key generation
FKP-ABE
ICN
indeterminate caches
information-centric networking
internet
Internet traffic
key policy attribute based encryption
fast key decryption
KP-ABE schemes
policy-based governance
pubcrawl
Scalability
self-contained protection
Streaming media
telecommunication traffic
Access Control
fast decryption
encryption
efficient KP-ABE scheme
efficient key-policy ABE
Data Security
Data protection
Cryptography
content protection
computer network security
computer architecture
collaboration
cached contents
cache storage
attribute-based encryption
attribute based encryption
profile
Honggang Wang
CPS Domains
CPS Technologies
computer architecture
wireless networks
Mobile Security
wireless sensor neteworks
computer systems
Massachusetts
biblio
Voltage Based Authentication for Controller Area Networks with Reinforcement Learning
Submitted by aekwall on Mon, 07/20/2020 - 10:44am
testing
spoofing model
spoofing attacks
physical authentication scheme
linear regression
ECU signals
CAN bus
authentication mode
electronic control units
controller area networks
controller area network security
Computers
computer network security
machine learning
Reinforcement learning
Neural networks
pubcrawl
Resiliency
learning (artificial intelligence)
cyber-physical systems
Support vector machines
computer architecture
Internet of Things
authorisation
« first
‹ previous
…
28
29
30
31
32
33
34
35
36
…
next ›
last »