Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
solid state drives
biblio
Random Number Generation Algorithms for Performance Testing
Submitted by grigby1 on Thu, 07/14/2022 - 5:14pm
Metrics
solid state drives
Random Performance
lookup table
Logical Block Address
linear feedback shift register
field programmable gate array
random key generation
Universal Serial Bus
Prediction algorithms
Logic gates
Scalability
performance evaluation
Generators
field programmable gate arrays
Resiliency
resilience
Human behavior
pubcrawl
biblio
WAS-Deletion: Workload-Aware Secure Deletion Scheme for Solid-State Drives
Submitted by aekwall on Wed, 04/13/2022 - 9:20am
Conferences
encryption
pubcrawl
Scalability
privacy
resource management
n/a
Costs
adaptive scheduling
Electric breakdown
solid state drives
data deletion
biblio
Per-File Secure Deletion for Flash-Based Solid State Drives
Submitted by grigby1 on Fri, 07/10/2020 - 10:41am
Per-file
SSD
solid state drives
Solid State Drive
Security-TRIM command
secure deletion
Scalability
resource management
real-time systems
pubcrawl
PSD-MLC scheme
programming crosstalk
programming
privacy
Per-File Secure Deletion scheme
Crosstalk
nonreal-time secure deletion
MultiLevel Cell flash memory
Media
invalid flash pages
Invalid Data Block
Hardware
GUID
globally unique identifier
flash-based solid state drives
flash memories
flash media
File update operations
data deletion
biblio
Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives
Submitted by grigby1 on Mon, 02/17/2020 - 4:07pm
microsoft windows
vulnerabilities
standards
SSD
solid state drives
Software
security weaknesses
security guarantees
reverse engineering
Resiliency
resilience
pubcrawl
policy-based governance
peripheral interfaces
password
bitlocker
Metrics
internal models
Human behavior
hardware-encryption
hardware full-disk encryption
Hardware
flash memories
firmware
external models
encryption software
encryption
Data protection
Cryptography
critical security weaknesses