Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
operating systems
biblio
Post-Quantum Cryptography in MPSoC Environments
Submitted by grigby1 on Tue, 02/22/2022 - 1:43pm
Multicore processing
resilience
Resiliency
Software
performance evaluation
Scalability
NIST
operating systems
microcontrollers
Metrics
MPSoC
automotive
AURIX
Post-quantum
PXROS-HR
Very large scale integration
multicore computing security
pubcrawl
biblio
A Certainty-guaranteed inter/intra-core communication method for multi-core embedded systems
Submitted by grigby1 on Tue, 02/22/2022 - 1:41pm
power electronics
software certainty
security
Scalability
resilience
real-time systems
pubcrawl
Program processors
Processor scheduling
embedded systems
operating systems
multicore computing security
DSP
delays
Metrics
composability
Resiliency
biblio
Programmable Data Planes as the Next Frontier for Networked Robotics Security: A ROS Use Case
Submitted by grigby1 on Thu, 02/03/2022 - 4:08pm
Protocols
robot operating systems security
in-network computing
P4
Human Factors
ROS
Writing
operating systems
malware
collaboration
robots
Resiliency
resilience
policy-based governance
pubcrawl
security
Computer hacking
biblio
Secure Communication System Implementation for Robot-based Surveillance Applications
Submitted by grigby1 on Thu, 02/03/2022 - 4:07pm
surveillance
robot operating systems security
Wireless communications
embedded hardware
Communication Systems
Robot vision systems
swarm robots
Service robots
Human Factors
collaboration
operating systems
Data Security
process control
Resiliency
resilience
policy-based governance
pubcrawl
biblio
Examining Autonomous Vehicle Operating Systems Vulnerabilities using a Cyber-Physical Approach
Submitted by grigby1 on Thu, 02/03/2022 - 4:06pm
Transportation
robot operating systems security
Transportation industry
Productivity
operating systems
autonomous vehicles
Human Factors
Roads
cyber-physical systems
collaboration
real-time systems
delays
Cybersecurity
Safety
Resiliency
resilience
policy-based governance
pubcrawl
biblio
Securing Robots: An Integrated Approach for Security Challenges and Monitoring for the Robotic Operating System (ROS)
Submitted by grigby1 on Thu, 02/03/2022 - 4:06pm
Agriculture
robot operating systems security
system verification
Production facilities
Integrated
dissertation
robotics
Human Factors
ROS
tools
operating systems
Task Analysis
Resiliency
resilience
policy-based governance
pubcrawl
security
collaboration
biblio
Security Assessment for Zenbo Robot Using Drozer and mobSF Frameworks
Submitted by grigby1 on Thu, 02/03/2022 - 4:06pm
operating systems
robot operating systems security
Zenbo
forensic
Assessment
Human Factors
Systematics
Humanoid robots
android
Mobile handsets
tools
Linux
Resiliency
resilience
policy-based governance
pubcrawl
IoT
security
Computer hacking
collaboration
biblio
F-SGX: Next Generation SGX for Trusted Computing
Submitted by aekwall on Tue, 01/25/2022 - 3:51pm
Image Processing
Hardware
operating systems
Conferences
Trusted Computing
pubcrawl
Resiliency
Human behavior
composability
side-channel attacks
Computers
attestation
SGX
side channel attack
Trusting computing
biblio
Research on Malware Variant Detection Method Based on Deep Neural Network
Submitted by grigby1 on Mon, 01/10/2022 - 12:31pm
Metrics
Virtualization
Software algorithms
sandbox
Resiliency
resilience
pubcrawl
policy-based governance
operating systems
Neural networks
Neural Network Security
virtualization privacy
malware
malicious code
Industrial Information Security
cyber physical systems
convolutional neural network
convolution
control systems
collaboration
Artificial Neural Networks
artificial neural network
biblio
Prevent Data Exfiltration on Smart Phones Using Audio Distortion and Machine Learning
Submitted by grigby1 on Mon, 01/10/2022 - 12:17pm
Mobile Applications
Switches
side-channel attacks
Side-channel attack
Servers
Scalability
Resiliency
resilience
pubcrawl
permissions
operating systems
Mobile Security
android
Metrics
malware
machine learning
Human behavior
encryption
codes
Clipboard Jacking
Audio Jacking
Audio Distortion
android encryption
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »