Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
embedded hardware
biblio
Secure Communication System Implementation for Robot-based Surveillance Applications
Submitted by grigby1 on Thu, 02/03/2022 - 4:07pm
surveillance
robot operating systems security
Wireless communications
embedded hardware
Communication Systems
Robot vision systems
swarm robots
Service robots
Human Factors
collaboration
operating systems
Data Security
process control
Resiliency
resilience
policy-based governance
pubcrawl
biblio
Semantics-Directed Prototyping of Hardware Runtime Monitors
Submitted by grigby1 on Mon, 11/04/2019 - 12:35pm
ROP-style code reuse attacks
Monitoring
multiple memory accesses
pubcrawl
rapid-prototyping runtime monitors
reconfigurable architectures
resilience
Resiliency
rop attacks
Model driven development
Runtime
Scalability
security of data
Semantics
semantics-directed prototyping
software monitor
software-based attacks
Biomedical monitoring
Instruction sets
Human Factors
Human behavior
high level synthesis
hardware-based protection
Hardware Security
hardware runtime monitors
hardware monitor
Hardware
formal verification
embedded systems
embedded processor
embedded hardware
composability
building memory protection mechanisms
biblio
Embedded policing and policy enforcement approach for future secure IoT technologies
Submitted by aekwall on Mon, 03/11/2019 - 10:37am
Root-of-trust
MPSoC
platform module
policy violation
potential technical vulnerabilities
pro-active policy
pubcrawl
Quality Control
Resiliency
malicious application
secure IoT technologies
software security technologies
SPE approach
supply chain efficiencies
system communication bus
system resources
Trusted Platfrom Modules
Zero-day attacks
computer network security
ARM TrustZone
Attack vectors
authentication mechanisms
authorisation
business operations
chain-of-trust
commercial building management
composability
additional threats
embedded applications
embedded hardware
embedded systems
end users
FPGA
hardware security policy engine
Internet of Things
IoT applications
biblio
Secure-by-construction Composable Componentry for Network Processing
Submitted by Heather Lucas on Wed, 09/17/2014 - 6:32pm
Embedded Software
Systems Engineering
Science of Security
CPS Technologies
Foundations
foundations
Tamper-Proof/Resistant Designs
systems engineering
Symmetric Cryptography and Hash Functions
stream processing
Security in Hardware
secure-by-construction
Science of Security
network processor
line-speed processor
hardware-software co-design
100 Gbps
Embedded Systems Security
embedded software
embedded hardware
Database and Storage Security
Data Anonymization and Sanitization
Cryptography
CPS Technologies
Block and Stream Ciphers
ACM CCS
ACM CCS
Cryptography
Block and Stream Ciphers
Data Anonymization and Sanitization
Embedded Systems Security
Database and Storage Security
Tamper-Proof/Resistant Designs
Security in Hardware
Symmetric Cryptography and Hash Functions