Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Embedded System
biblio
Enhancing Security and Privacy of Next-Generation Edge Computing Technologies
Submitted by aekwall on Mon, 11/16/2020 - 1:57pm
attack surface area
Resilient Security Architectures
system security manager
Security Micro-architecture
reputational penalties
raw confidential data
next-generation edge computing technologies
Internet-of-Things service architectures
financial penalties
edge security
device level attacks
Data protection
data confidentiality breach
Cloud to Edge
IoT
Active Security
cyber resilience
Embedded System
IoT architecture
edge computing
GDPR
pubcrawl
Resiliency
Internet of Things
data privacy
Data Security
computer network security
biblio
A Practical Attestation Protocol for Autonomous Embedded Systems
Submitted by aekwall on Mon, 08/17/2020 - 10:35am
remote device
secure operation
safe operation
PASTA
network disruptions
Mesh networks
low-end verifier devices
low-end prover devices
low-end embedded devices
existing attestation protocols
connected embedded devices
collective attestation
autonomous system
autonomous networks
autonomous embedded systems
arbitrary device outages
Internet of Things
security guarantees
Scalability
Embedded System
computer networks
Robustness
composability
pubcrawl
Human behavior
Resiliency
embedded systems
Protocols
performance evaluation
security
Remote Attestation
attestation
biblio
Investigation of Availability of Wireless Access Points based on Embedded Systems
Submitted by aekwall on Mon, 06/15/2020 - 9:58am
scientific wireless networks
available hardware
commercial networks
Economic indicators
embedded hardware platforms
external network adapter
internal wireless network adapter
load testing
Python programming language
wireless network
service.
single classification
software solution
threat
wireless access points
wireless infrastructure
wireless subscribers
Wireless communication
Servers
Internet of Things
Hardware
embedded systems
operating system
Resiliency
pubcrawl
composability
security
Metrics
internet
Vulnerability
radio access networks
Embedded System
operating systems (computers)
operating systems
biblio
Secure firmware update in embedded systems
Submitted by aekwall on Mon, 06/15/2020 - 9:58am
man-in-the-middle
weak point
update package encryption process
update
target hardware
symmetric encryption algorithms
symmetric encryption
specific encryption algorithms
secure update process
secure firmware update
safety critical operations
potential attackers
man-in-the-middle attacks
great numbers
asymmetric encryption algorithms
Asymmetric Encryption
security
Hash functions
intellectual property
confidentiality
authenticity
Embedded System
firmware
Metrics
composability
pubcrawl
Resiliency
embedded devices
embedded systems
telecommunication security
Cryptography
biblio
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems
Submitted by aekwall on Mon, 06/15/2020 - 9:56am
Hardware
μArmor approach
vulnerability exposure windows
statistical analysis
security of data
security
Resiliency
real-time systems
pubcrawl
operating systems (computers)
Metrics
Linux
Linux Operating System Security
Exploiting
exploit mitigation
embedded systems
Embedded System
embedded patch management
embedded operating systems
embedded memory corruption vulnerabilities
deeply embedded systems
composability
common hardening techniques
Predictive Metrics
biblio
Research on Improving Network Security of Embedded System
Submitted by aekwall on Mon, 06/15/2020 - 9:55am
information technology
Servers
Resiliency
pubcrawl
promotion countermeasures
network security
network attack
mobile embedded systems
Metrics
IPsec
internet
authentication
embedded systems
embedded system network
Embedded System
embedded network security
computer technology
computer network security
composability
Communication networks
certification
brand-new computer technology
biblio
Research of Secure Communication of Esp32 IoT Embedded System to.NET Core Cloud Structure Using MQTTS SSL/TLS
Submitted by grigby1 on Mon, 02/10/2020 - 10:31am
JSON type data format
TLS/SSL
Temperature sensors
SSL/TLS certificate
SSL Trust Models
secure communication
Scalability
Resiliency
resilience
pubcrawl
Protocols
protocol
MQTTS protocol
MQTTS
microprocessor chips
Metrics
.NET core cloud structure
IoT device
IoT Cloud
IoT
Internet of Things
humidity sensors
Human Factors
Human behavior
Esp32 Wrover
Esp32 IoT embedded system
encrypted communication
embedded systems
Embedded System
Cryptography
Cloud Computing
cloud
biblio
A Novel Intrusion Detection Method for Internet of Things
Submitted by aekwall on Mon, 01/20/2020 - 10:56am
intrusion attacks
security of data
optimal network structure
Neurons
network intrusion detection
Metrics
IoT technology
IoT system
IoT networks
Intrusion Detection Systems
intrusion detection model
intrusion detection method
Intrusion Detection
belief networks
Internet of Things era
Internet of Things
genetic algorithms
Embedded System
deep learning
Deep Belief Network
DBN
Biological cells
Artificial Neural Networks
Resiliency
composability
pubcrawl
biblio
Smartunit: Empirical Evaluations for Automated Unit Testing of Embedded Software in Industry
Submitted by grigby1 on Mon, 08/05/2019 - 10:40am
automated unit testing
dynamic symbolic execution
Embedded System
Human behavior
Human Factors
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
zero trust
biblio
SEnSE – An Architecture for a Safe and Secure Integration of Safety-Critical Embedded Systems
Submitted by aekwall on Wed, 05/01/2019 - 11:42am
pubcrawl
trustcenter
SEnSE
security
secure integration
secure and safe embedded
safety-critical software
safety-critical embedded systems
Safety
safe interaction
safe integration
Runtime
Resiliency
recertification
architecture
performance evaluation
Metrics
embedded systems
Embedded System
dynamic system
cyberphysical system
cyber-physical systems
contract-based development
composability
communication protocol
cloud application
automobiles
authorization
« first
‹ previous
1
2
3
next ›
last »