Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
testing
biblio
Towards Formalization of Enhanced Privacy ID (EPID)-based Remote Attestation in Intel SGX
Submitted by grigby1 on Thu, 05/13/2021 - 2:07pm
privacy
Trusted Execution Environment
testing
Software
Resiliency
resilience
Remote Attestation
pubcrawl
Protocols
attestation
Intel SGX
Human behavior
formal verification
Enhanced Privacy ID (EPID)
Cryptography
Computational modeling
composability
biblio
Weapon Detection using Artificial Intelligence and Deep Learning for Security Applications
Submitted by grigby1 on Thu, 05/13/2021 - 11:58am
Weapons
weapon detection
SSD
Faster RCNN
Communication Systems
CCTV
object detection
computer vision
artificial intelligence security
Artificial Intelligence (AI)
Training
graphics processing units
testing
composability
Conferences
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Forensic analysis of Windows 10 Sandbox
Submitted by grigby1 on Wed, 05/05/2021 - 12:55pm
collaboration
collaboration agreements
composability
Digital Forensics
Open Source Software
operating systems
policy-based governance
Prefetching
pubcrawl
sandbox
sandboxing
Scalability
testing
tools
virtual environments
Windows 10
biblio
Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process
Submitted by grigby1 on Wed, 05/05/2021 - 12:23pm
Computer bugs
Hardware
Memory management
pubcrawl
Scalability
Scalable Security
security
Software
testing
biblio
UP2DATE: Safe and secure over-the-air software updates on high-performance mixed-criticality systems
Submitted by aekwall on Tue, 04/27/2021 - 1:15pm
security
Safety
Hardware
Software
computer architecture
pubcrawl
testing
contracts
Heterogeneous computing
Availability
composability
mixed-criticality
OTASU
biblio
Performance Analysis of IDS Snort and IDS Suricata with Many-Core Processor in Virtual Machines Against Dos/DDoS Attacks
Submitted by grigby1 on Fri, 04/09/2021 - 11:32am
Central Processing Unit
testing
virtual machine
Performance analysis
IDS
Telecommunications
transport protocols
DoS
denial-of-service attack
operating systems (computers)
IDS Snort version
IDS Suricata
many-core processor
physical machine
Snort
Suricata
TCP Flood attack test
IP networks
resilience
DDoS
virtual machines
Virtual machining
DDoS Attacks
multiprocessing systems
telecommunication traffic
composability
Wireless communication
intrusion detection system
wireless sensor networks
microprocessor chips
computer network security
Resiliency
pubcrawl
biblio
Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency
Submitted by aekwall on Thu, 04/08/2021 - 4:33pm
Proposals
testing
Semantics
semantic consistency
security
Scalability
rop attacks
Resiliency
pubcrawl
Prototypes
return oriented programming
Information Reuse and Security
Human Factors
Entropy
computer architecture
Compositionality
composability
code reuse attacks
code randomization
biblio
Machine Learning Methods for Anomaly Detection in Industrial Control Systems
Submitted by grigby1 on Tue, 03/30/2021 - 11:53am
industrial control system security
testing
Scalability
Resiliency
resilience
random forests
pubcrawl
Neural networks
machine learning
Integrated circuit modeling
Anomaly Detection
industrial control
ICS Anomaly Detection
ICs
deep learning
cyber-physical system security
CPS
boosting
Artificial Neural Networks
biblio
Simplified Method for Fast and Efficient Incident Detection in Industrial Networks
Submitted by grigby1 on Tue, 03/30/2021 - 11:51am
industrial network
testing
telecommunication traffic
standards
simplified method
security incident detection
security
Scalability
Resiliency
resilience
pubcrawl
Protocols
network traffic
Modbus protocol
machine learning
intrusion detection system
Anomaly Detection
industrial Modbus protocol
IDS system Zeek
IDS
identified signature recognition
identified anomaly recognition
ICS Anomaly Detection
ICs
fast incident detection
efficient incident detection
DoS Attack Detection
DNP3 protocol
distributed network protocol 3
digital signatures
computer network security
biblio
TEADS: A Defense-Aware Framework for Synthesizing Transient Execution Attacks
Submitted by grigby1 on Wed, 03/17/2021 - 12:42pm
pubcrawl
transient execution attacks
Transient analysis
testing
synthesize
security
Scalability
Resiliency
resilience
attack chains
Program processors
privacy
microarchitecture
Heuristic algorithms
framework
dynamically
Chained Attacks
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »