Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Program processors
biblio
Methods and Special Processors of Entropy Signal Processing
Submitted by grigby1 on Wed, 03/04/2020 - 4:14pm
entropy-manipulated signals
Time
theoretical cryptography
theoretical comments
special processors
signal processing
pubcrawl
Program processors
probability
Probabilistic logic
probabilistic entropy
Hardware
estimation
a special processor
entropy signal processing
Entropy
Cryptography
correlation activity
Correlation
Compositionality
composability
Ciphers
cipher signals
cipher signal receivers
and structural complexity
biblio
System Analysis of Caching Requests on Network Computing Nodes
Submitted by grigby1 on Tue, 02/18/2020 - 11:55am
netvork
Web Caching
vertical scaling
Task Analysis
systems analysis
system analysis
Scalability
Resiliency
resilience
Program processors
planing of the systems
Nodes
network computing nodes
pubcrawl
Metrics
Loading
Load modeling
Load management
internet
horizontal scaling
distributed fail-safe Web systems
Distributed databases
caching requests
caching
cache storage
biblio
Automatically Validating the Effectiveness of Software Diversity Schemes
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
program compilers
compiler security
software protection
software diversity schemes
software diversity
scant attention
exploit mitigation
diversity techniques
diversity strategies
diversifying compiler
DARPA Cyber Grand Challenge environment
comparative evaluation
compilers
security of data
Compositionality
Semantics
evaluation
Measurement
computer security
Cybersecurity
vulnerabilities
Metrics
pubcrawl
Resiliency
Program processors
Scalability
biblio
Information-Flow Preservation in Compiler Optimisations
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
Scalability
optimization
passive side-channel attacks
program optimisations
Program processors
program transformations
program verification
pubcrawl
Resiliency
optimising compilers
Semantics
side-channel
side-channel attacks
source program
standard compiler passes
standards
target program
I-O Systems
Micromechanical devices
Metrics
information-flow preserving program transformation
information-flow preservation
information-flow leaks
Information Flow
IFP
correct compilers
Compositionality
compiler security
compiler optimisations
compiler
CompCert C compiler
security
i-o systems security
biblio
What You Get is What You C: Controlling Side Effects in Mainstream C Compilers
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
language security
compiler performance
compiler upgrade
compiler writers
compilers
constant-time
CPUs
crypto code
cryptographic algorithm
cryptographic protocol security
erasing
implicit properties
compiler optimizations
LLVM
mainstream C compilers
secure code
Security Engineers
side channels
side effects
stack
timing channel
zeroing
compiler security
timing
Cryptography
Cryptographic Protocols
Program processors
Resiliency
pubcrawl
Metrics
standards
optimization
Libraries
optimisation
program verification
Scalability
Security Properties
Compositionality
program compilers
C
C abstract machine
C++ language
careful programmer
Clang
compiler commands
Compiler Optimization
biblio
Spectre Attacks: Exploiting Speculative Execution
Submitted by aekwall on Mon, 10/14/2019 - 10:20am
Program processors
Transient analysis
speculative-execution
Spectre
side-channel attacks
Scalability
return oriented programming
Resiliency
Registers
pubcrawl
rop attacks
microarchitecture-security
microarchitecture
microarchitectural-attack
Human Factors
Human behavior
Hardware
composability
arrays
biblio
Multilayer ROP Protection Via Microarchitectural Units Available in Commodity Hardware
Submitted by aekwall on Mon, 10/14/2019 - 10:20am
multilayer protection approach
Web browsers
security of data
Scalability
Runtime
ROP
Return-oriented Programming attacks
return oriented programming
Resiliency
RAS
pubcrawl
Program processors
Nonhomogeneous media
multilayer system
multilayer ROP protection
rop attacks
microarchitecture
microarchitectural units
lightweight security techniques
LBR
layers
Human Factors
Human behavior
Hardware
computer architecture
composability
commodity hardware
CFI
Benchmark testing
architecture
biblio
Designing Secure and Resilient Embedded Avionics Systems
Submitted by aekwall on Wed, 05/01/2019 - 12:41pm
Program processors
unmanned aerial systems
UAS
security principles
security of data
security
safety oriented principles
Safety
resilient embedded avionics systems
Resiliency
real-time systems
pubcrawl
aerospace computing
Metrics
Laboratories
embedded systems
cyber security principles
cyber resources
computer architecture
composability
avionics domains
avionics community
avionics
Aerospace electronics
biblio
Using Intel SGX to Protect Authentication Credentials in an Untrusted Operating System
Submitted by aekwall on Mon, 03/18/2019 - 9:49am
Software Guard Extensions
PAM authentication framework
password
password file protection scheme
private memory regions
privileged code
sensitive applications
SGX enclave
Software Architecture
OS kernel
TCB
trusted computing base
UniSGX
Unix
Unix systems
untrusted operating system
BIOS Security
Human behavior
Scalability
authorisation
encryption
telecommunication security
Hardware
Program processors
Trusted Computing
Resiliency
security of data
pubcrawl
Metrics
authentication
Intel SGX
authentication credentials
BIOS
computational security
biblio
Privacy-Preserving Frequent Pattern Mining from Big Uncertain Data
Submitted by grigby1 on Wed, 03/06/2019 - 4:26pm
imprecise and uncertain data
uncertainty
transaction-centric mining approach
Program processors
privacy-preserving mining
privacy-preserving frequent pattern mining
privacy and security
knowledge management
knowledge discovery in databases
Itemsets
item-centric mining approach
item-centric mining
data privacy
fruition processes
frequent patterns
data science
big uncertain data
big data science solutions
big data privacy
Data Analytics
Clustering algorithms
Data mining
pubcrawl
Big Data
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »