Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics
Submitted by grigby1 on Wed, 02/21/2018 - 1:38pm
secure autonomous aerial surveillance
Multicore Computing
multicore computing security
near-sensor data analytics pipeline
Neural networks
parallel architectures
pubcrawl
regular computing task
remote recognition
resilience
Resiliency
Scalability
Metrics
security of data
seizure detection
sensitive data protection
sensors
size 65 nm
SoC
software programmability
system-on-chip
tightly-coupled multicore cluster
voltage 0.8 V
energy 3.16 pJ
CNN
compute-intensive data processing
computer architecture
computerised instrumentation
Cryptography
data analysis
Data Security
deep convolutional neural network
electroencephalogram
encrypted data collection
encryption
approximate computing
energy conservation
Engines
equivalent reduced instruction set computer operation
Face detection
feature extraction
Fulmine tight power envelope
Internet of Things
Internet-of-Things endpoint
IoT endpoint system-on-chip
low-power electronics
biblio
Confidentiality and Authenticity in a Platform Based on Network-on-Chip
Submitted by grigby1 on Wed, 02/21/2018 - 1:37pm
network performance
SoCIN-based systems
silicon overhead
Security Properties
security mechanisms
security aspects
security
Scalability
Resiliency
resilience
reference multicore platform
pubcrawl
Program processors
processing elements
networks-on-chip
network-on-chip
advanced encryption standard
network level
Network interfaces
multiprocessing systems
multicore computing security
Multicore Computing
Metrics
Many-core systems
low-cost interconnect architecture
encryption
Cryptography
confidentiality
computer architecture
authenticity
AES model
biblio
Augmenting Security of Internet-of-Things Using Programmable Network-Centric Approaches: A Position Paper
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
IoT systems
Software Defined Networks
situational awareness
service-centric architecture
security of data
security
Resiliency
pubcrawl
Protocols
programmable network-centric approaches
Metrics
Logic gates
Big Data
Internet-of-Things
Internet of Things
industrial IoT systems
Home appliances
data analytics techniques
data analysis
computer architecture
composability
communications infrastructure
Cloud Computing
Big Data Analytics
biblio
The Design and Implementation of a Multicast Address Moving Target Defensive System for Internet-of-Things Applications
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
multicast communication
working IoT operating system
Synchronization
Simple Agile RPL multiCAST
SARCAST
Routing protocols
Resistance
Resiliency
Reconnaissance
pubcrawl
Protocols
operating systems (computers)
Network reconnaissance
network performance
address agility
multicast address moving target defensive system
IP networks
Internet-of-Things routing protocol
Internet-of-Things applications
Internet of Things
DRM
distributed denial-of-service attacks
DDoS Resistant Multicast
DDoS protection
DDoS Attacks
computer network security
Computer crime
computer architecture
biblio
A Tamper-Resistant Digital Token-Based Rights Management System
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
rights management system
message authentication
Metrics
Peer-to-peer computing
peer-to-peer manner
Protocols
pubcrawl
public key cryptography
Resiliency
internet
Scalability
Symmetric Key Cryptography
Tamper-Resistance
tamper-resistant digital token
tamper-resistant digital tokens
token owner
Ubiquitous Computing Security
Access Control
Human Factors
Human behavior
hardware-software collaboration
Hardware
groupware
eTRON architecture
digital token
Digital rights management
Cryptography
computer architecture
authorisation
authentication
asymmetric cryptography
APIs
API
biblio
Ransomware: The CryptoVirus Subverting Cloud Security
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
security
malware
Metrics
pubcrawl
Ransomware
ransomware attack
ransomware vulnerabilities
Resiliency
Scalability
IT security specialists
security effectiveness
security threat
Servers
threats
ubiquitous computing
Ubiquitous Computing Security
ubiquitous environment
vulnerabilities
cloud threat mechanisms
business enterprises
cloud
Cloud architecture
Cloud Computing
cloud network
cloud platforms
Cloud Security
cloud technology
Business
computer architecture
computer viruses
Cryptography
CryptoVirus
disparate locations
Human behavior
Human Factors
information technology
biblio
A Catalog of Security Architecture Weaknesses
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
pubcrawl
weakness
Software systems
software reliability
software quality
software assurance
software architecture design
Software Architecture
security tactics
security of data
security design thinking
security bugs
security architecture weaknesses
security architectural flaw identification
secure software systems
Scalability
architectural choices
mitigation techniques
internet
interactive Web-based solution
interactive systems
Flaw
Computer bugs
computer architecture
composability
Common Architectural Weakness Enumeration
CAWE catalog
CAWE
authentication
architecture
architectural decisions
biblio
Generalize or Die: Operating Systems Support for Memristor-Based Accelerators
Submitted by grigby1 on Fri, 02/02/2018 - 1:25pm
memristors
ultra low energy
typical OS functionality
transistor feature size scaling
specialized accelerators
scientific computing
Scalability
Resiliency
quantum computing security
pubcrawl
programming
primary function
operating systems (computers)
operating system
microprocessor chips
Metrics
accelerator implementation
Memristor
master slave models
machine learning
learning (artificial intelligence)
Imaging
hardware resources
Hardware
general purpose system
field programmable gate arrays
Engines
Electronic mail
Dot Product Engine
computer architecture
composability
biblio
IoT Components LifeCycle Based Security Analysis
Submitted by grigby1 on Fri, 02/02/2018 - 1:17pm
Insulin pumps
biomedical electronics
biomedical equipment
complex interactions
composability
computer architecture
connected insulin pump
EBIOS methodology
electronic device lifecycle
embedded systems
generic model
Hardware
Software
Internet of Things
IoT component lifecycle
lifecycle induced vulnerabilities
Metrics
performance evaluation
Production
pubcrawl
Resiliency
security
Security analysis
security of data
biblio
Toward resilient networks with fog computing
Submitted by K_Hooper on Fri, 02/02/2018 - 11:07am
IoT
Cloud and fog computing
Cloud Computing
Computational modeling
computer architecture
core network
delays
Disruption Tolerance
edge computing
edge networks
Fog computing
Future Internet
Internet of Things
toward resilient networks
IoT architecture
network resilience
network traffic
ns-3 network simulation
on-demand computing power
Open-Fog
pubcrawl
Resiliency
Resilient Security Architectures
security
Survivability
« first
‹ previous
…
45
46
47
48
49
50
51
52
53
…
next ›
last »