Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-physical system
biblio
Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks
Submitted by grigby1 on Tue, 12/17/2019 - 12:22pm
resilience
pubcrawl
Metrics
Resiliency
composability
cyber-physical systems
cyber-physical system
Symbolic Execution
Concurrency
cache
Side-channel attack
timing
Predictive Metrics
biblio
A Robust and Efficient Defense Against Use-after-Free Exploits via Concurrent Pointer Sweeping
Submitted by grigby1 on Tue, 12/17/2019 - 12:22pm
resilience
pubcrawl
Metrics
Resiliency
composability
use-after-free
cyber-physical systems
software security
cyber-physical system
Concurrency
vulnerability defense
Predictive Metrics
biblio
Formal Security Verification of Concurrent Firmware in SoCs Using Instruction-Level Abstraction for Hardware*
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
resilience
Metrics
microprocessor chips
Microprogramming
multi-threading
multithreaded program verification problem
Predictive Metrics
program verification
pubcrawl
intellectual property security
Resiliency
Secure Boot design
security of data
SoC security verification
software verification techniques
system-on-chip
Systems-on-Chip
cyber-physical systems
architecture level
bit-precise reasoning
cognition
composability
Concurrency
concurrency (computers)
concurrent firmware
cyber-physical system
Access Control
firmware
firmware-visible behavior
formal security verification
Frequency modulation
Hardware
Instruction-Level Abstraction
intellectual property blocks
biblio
UFO: Predictive Concurrency Use-After-Free Detection
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
security of data
program diagnostics
program operating
provably higher detection capability
pubcrawl
rare thread schedules
resilience
Resiliency
Schedules
scheduling
program debugging
single observed execution trace
tools
UAF
UAF detection
UAF vulnerabilities
UFO
UFO scales
use-after-free vulnerabilities
vulnerabilities
cyber-physical system
Chromium
common attack vectors
composability
Concurrency
concurrency UAF
concurrency use-after-free detection
Concurrent computing
concurrent programs
critical software systems
Browsers
cyber-physical systems
encoding
extended maximal thread causality model
Instruction sets
larger thread scheduling space
Metrics
multi-threading
multithreaded execution trace
Predictive Metrics
biblio
IoT Security Model and Performance Evaluation: A Blockchain Approach
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
model construction
Throughput
theoretical data support
System performance
security risks
security problems
security of data
security model
Resiliency
resilience
Public key
pubcrawl
Predictive Metrics
performance evaluation
Packaging
blockchain
Metrics
IoT security model
InterPlanetary File System
Internet of Things
distributed large capacity storage
cyber-physical systems
cyber-physical system
Cryptography
concurrency (computers)
Concurrency
composability
blockchain-based security model
blockchain technology
biblio
OWL: Understanding and Detecting Concurrency Attacks
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
Computer bugs
Predictive Metrics
Concurrency
Software Testing
single-threaded programs
OWL source code
OWL
knowledge representation languages
concurrency bug detectors
concurrency attack exploit scripts
Concurrency Attack
bug-inducing inputs
Concurrent computing
concurrency control
security
cyber-physical system
cyber-physical systems
Instruction sets
program debugging
public domain software
Linux
composability
Resiliency
Metrics
pubcrawl
resilience
tools
biblio
Concurrency Strategies for Attack Graph Generation
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
pubcrawl
Multi-threaded Programming
network attack graph
network security
network state space
OpenMP
OpenMP-based programming implementation
parallel algorithms
Predictive Metrics
Metrics
resilience
Resiliency
Scalability
scalable attack graphs
security of data
storage costs
storage management
telecommunication security
Concurrent computing
security
attack graph
attack graph generation
attack graphs
composability
Computational modeling
concurrency control
concurrency strategies
Concurrency
cyber-physical system
cyber-physical systems
cyberphysical
Generators
graph theory
Instruction sets
large-scale graph
message passing
biblio
Security for Safety: A Path Toward Building Trusted Autonomous Vehicles
Submitted by grigby1 on Wed, 10/23/2019 - 12:35pm
cyber-physical system
estimation
Human behavior
Human Factors
Metrics
pubcrawl
resilience
Resiliency
Safety
Scalability
security
Security Risk Estimation
Self-Driving Car
Sensor attack
biblio
Evaluating the effects of cyber-attacks on cyber physical systems using a hardware-in-the-loop simulation testbed
Submitted by willirn1 on Fri, 05/31/2019 - 10:41am
resilience
hardware-in-the-loop simulation testbed
HIL testbed
model based software development framework
Model Integrated Computing
physical components
physical system
platform specific performance measurements
railway transportation system
hardware-in-the-loop
security of data
simulation environment
Software
software engineering
system functions
testbed
Vanderbilt
vulnerability assessment
cyber-attack effect evaluation
actuation capability
Analytical models
Computational modeling
computer architecture
computer security
CPS attack experiments
cyber components
cyber physical systems
System-security co-design
cyber-physical system
cyber-physical systems
cybersecurity design process
embedded computers
embedded systems
Experimentation
Hardware
hardware-in-the loop simulation
biblio
A Stochastic Game Approach to Cyber-Physical Security with Applications to Smart Grid
Submitted by grigby1 on Fri, 02/22/2019 - 4:04pm
power system measurement
CPS
cyber layer
cyber-physical security
defending strategies
effective defense strategies
physical damage
Physical layer
physical system
Markov processes
Power system protection
stochastic game approach
stochastic games
system operator
value iteration
wide-area monitoring
zero-sum Markov game
Stochastic computing
cyber-physical systems
security of data
Games
pubcrawl
Resiliency
Scalability
Conferences
Nash Equilibrium
cyber attack
security
power engineering computing
power system security
game-theoretic approach
cyber-physical system
Smart Grids
smart power grids
Smart Grid
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »