Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
formal security
biblio
Provable security analysis of complex or smart computer systems in the smart grid
Submitted by grigby1 on Wed, 02/21/2018 - 1:50pm
smart computer systems
power engineering computing
power system security
provable security analysis
pubcrawl
Radiation detectors
resilience
Resiliency
Scalability
security of data
simple promela interpreter
Ports (Computers)
Smart Grid
smart grid security
smart power grids
smart system
SPIN
Temporal Logic
temporal logics
Transition System
TS
Formal Specification
access control mechanism
ACM
authorisation
automata
automata theory
Büchi Automaton
computer security
formal security
formal security analysis
provable security
formal verification
FSA
Linear Temporal Logics
LTL
Mathematical model
Metrics
model checking
operating system
OS
biblio
Toward a Science of Secure Environments
Submitted by BrandonB on Tue, 05/05/2015 - 11:43am
environmental security
Systems Security
software security
security of data
security
secure environments
Science of Security
optimisation
network security
modeling
fundamental science
formal security
agile systems
detection mechanisms
Decision Making
cyber-decision-making
cyber security collaborative research alliance
cyber environment
continuous optimization problem
computer security
Computational modeling
Communities
Approximation methods
biblio
Toward a Science of Secure Environments
Submitted by BrandonB on Thu, 04/30/2015 - 12:59pm
environmental security
Systems Security
software security
security of data
security
secure environments
Science of Security
optimisation
network security
modeling
fundamental science
formal security
agile systems
detection mechanisms
Decision Making
cyber-decision-making
cyber security collaborative research alliance
cyber environment
continuous optimization problem
computer security
Computational modeling
Communities
Approximation methods
biblio
Memory Trace Oblivious Program Execution
Submitted by Heather Lucas on Wed, 09/17/2014 - 6:46pm
Oblivious RAM
variable partitioning
type system
Semantics
Random access memory
programming language techniques
program verification
program diagnostics
program compilers
probing memory buses
physical control
physical attacks
physical access
ORAM banks
optimal efficiency
arrays
memory trace oblivious program execution
memory access traces
memory access overhead
formal security
encryption
DRAM chips
Cryptography
computing platform
computing infrastructure
compiler
cold-boot style attacks
cloud service providers
Cloud Computing