Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Safety
biblio
Security issues in controller area networks in automobiles
Submitted by grigby1 on Wed, 09/05/2018 - 10:55am
instrument cluster
controller area networks
BMW E90 instrument cluster
CAN (Controller Area Network)
CAN protocol
CAN-bus
ECU
ECU (Electronic Control Unit)
electronic control units
controller area network
modern automobiles
modern car hacking
modern vehicles
render vehicles
Rogue device
spoofed messages
controller area network security
data encryption
pubcrawl
Resiliency
performance evaluation
Cryptography
Protocols
security of data
authentication
Safety
security
automobiles
traffic engineering computing
security issues
resilience
Instruments
Automotive engineering
automotive electronics
biblio
Ideal complexity cryptosystem with high privacy data service for cloud databases
Submitted by grigby1 on Wed, 09/05/2018 - 10:39am
Databases
storage services
secrecy
Scalability
Safety
Resiliency
resilience
pubcrawl
privacy
metadata
human factor
Human behavior
high privacy data service
encryption techniques
encryption
client data
database management systems
Database as a service
data storage
data privacy
data confidentiality
cryptosystem
Cryptography
Concurrency
Computing Theory
Complexity theory
Cloudcomputing
cloud service provider
cloud databases
Cloud Computing
biblio
Design, control amp;amp; performance analysis of secure you IoT based smart security system
Submitted by grigby1 on Thu, 08/23/2018 - 11:44am
mobile computing
wireless sensor networks
wireless sensor based security system
smart system
Smart security
smart routing
sensors
security
Safety
Radar vision
Radar tracking
radar imaging
pubcrawl
Mobile Technology
capacitive sensing
Mobile Applications
Mobile Application
IoT based smart security system
Internet of Things
internal security
Intelligent sensors
external security
Cryptography
computational intelligence
Compositionality
composability
capacitive sensors
biblio
Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study
Submitted by grigby1 on Thu, 08/23/2018 - 11:36am
security risks
automotive
automotive electronics
automotive applications
Bluetooth
Bluetooth connectivity
bluetooth security
Bluetooth-enabled systems
composability
Cybersecurity
Resiliency
Safety
Roads
security
wireless interfaces
telecommunication security
Human behavior
human factor
infotainment
Inspection
malicious attacks
on-board communications
Pins
pubcrawl
resilience
threat intelligence
war-nibbling
biblio
Correct-by-Construction Adaptive Cruise Control: Two Approaches
Submitted by el_wehby on Sun, 05/27/2018 - 6:53pm
Acceleration
Adaptive cruise control (ACC)
automotive safety
Computational modeling
Correct-by-Construction
Cruise control
formal methods
Lead
Safety
Software
supervisory control.
vehicles
1552668
biblio
Power Grid Safety Control via Fine-Grained Multi-Persona Programmable Logic Controllers
Submitted by grigby1 on Wed, 05/09/2018 - 2:56pm
collaboration
Human Factors
Metrics
Monitoring
policy-based governance
Policy-Governed Secure Collaboration
power grids
Power system dynamics
pubcrawl
resilience
Resiliency
Safe Coding
Safety
security
Substations
biblio
Hiding the Long Latency of Persist Barriers Using Speculative Execution
Submitted by grigby1 on Wed, 05/09/2018 - 2:56pm
resilience
nonvolatile memory technology
NVMM
pcommit
performance bottleneck
performance overhead
persist barriers
persistence instructions
policy-based governance
Policy-Governed Secure Collaboration
pubcrawl
Random access memory
random-access storage
Nonvolatile memory
Resiliency
Safe Coding
Safety
significant execution time overhead
Software
speculative execution
Speculative Persistence
speculative persistence architecture
storage management
substantial performance boost
volatile caches
fail-safe code
checkpoint-based processing
checkpointing
clflushopt
clwb
collaboration
common data structures
consistent state
data structures
DRAM
DRAM chips
expensive fence operations
cache storage
Failure Safety
file system
Force
Human Factors
logging based transactions
long latency persistency operations
Metrics
modern systems reorder memory operations
non-volatile main memory
nonpersistent implementations
NonVolatile Main Memory
biblio
Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks
Submitted by K_Hooper on Wed, 05/02/2018 - 10:42am
Safety
vehicular networks
vehicular ad hoc networks
Vehicle driving
sybil attacks
SVM kernel functions based classifiers
Support vector machines
support vector machine based Sybil attack detection method
SUMO simulator
security of data
security
Ad hoc networks
Resiliency
pubcrawl
Peer-to-peer computing
Metrics
learning (artificial intelligence)
Eigenvalues and eigenfunctions
driving pattern matrices
DPM
composability
biblio
INTERLOC: An interference-aware RSSI-based localization and sybil attack detection mechanism for vehicular ad hoc networks
Submitted by K_Hooper on Wed, 05/02/2018 - 10:41am
Observers
vehicular ad hoc networks
VANET traffic safety
VANET Security
telecommunication security
sybil attacks
sybil attack detection mechanism
Sybil attack detection
Safety
RSSI-based localization technique
RSSI
road traffic
Resiliency
Radio propagation
pubcrawl
automobiles
Metrics
Location Accuracy
localization techniques
localization
INTERLOC
interference-aware RSSI-based localization
interference (signal)
Interference
inter-vehicular communications
heterogeneous interference
GPS
Global Positioning System
composability
biblio
A Global Approach for the Improvement of UHF RFID Safety and Security
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
Safety
UHF RFID tags
UHF RFID security improvement
UHF RFID safety improvement
UHF RFID
UHF devices
telecommunication network reliability
system robustness evaluation
system behavior simulation
supply chain security
security
secure tag hardware architectures
secure protocols
Scalability
authentication
Robustness
RFID privacy
Resiliency
resilience
radiofrequency identification
pubcrawl
Protocols
ns2
Human behavior
Hardware
fpga prototyping
Cryptographic Protocols
Authentication Protocols
« first
‹ previous
…
27
28
29
30
31
32
33
34
35
…
next ›
last »