Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Security in Hardware
biblio
Vulnerability of Transportation Networks to Traffic-Signal Tampering
Submitted by Katie Dey on Mon, 04/11/2016 - 11:20am
Resilient Systems
Science of Security
pubcrawl
cps resiliency
Resiliency
attack-resilience
Cyber-security
network security
Resilient Systems
Science of Security
Security in Hardware
SURE Project
tampering attack
traffic model
Transportation network
Network Security
Security in Hardware
biblio
Is There Value in Reasoning About Security at the Architectural Level: A Comparative Evaluation
Submitted by Heather Lucas on Wed, 09/17/2014 - 5:32pm
Science of Security
Foundations
ACM CCS
cyber security
foundations
Science of Security
Security in Hardware
ACM CCS
Cyber Security
Security in Hardware
biblio
Secure-by-construction Composable Componentry for Network Processing
Submitted by Heather Lucas on Wed, 09/17/2014 - 5:32pm
Embedded Software
Systems Engineering
Science of Security
CPS Technologies
Foundations
foundations
Tamper-Proof/Resistant Designs
systems engineering
Symmetric Cryptography and Hash Functions
stream processing
Security in Hardware
secure-by-construction
Science of Security
network processor
line-speed processor
hardware-software co-design
100 Gbps
Embedded Systems Security
embedded software
embedded hardware
Database and Storage Security
Data Anonymization and Sanitization
Cryptography
CPS Technologies
Block and Stream Ciphers
ACM CCS
ACM CCS
Cryptography
Block and Stream Ciphers
Data Anonymization and Sanitization
Embedded Systems Security
Database and Storage Security
Tamper-Proof/Resistant Designs
Security in Hardware
Symmetric Cryptography and Hash Functions
biblio
Building the Security Behavior Observatory: An Infrastructure for Long-term Monitoring of Client Machines
Submitted by aforget on Wed, 09/17/2014 - 5:32pm
Architectures
Architectures
ACM CCS
Architectures
CPS Technologies
cyber security
Database and Storage Security
foundations
Hardware Security Implementation
Human and Societal Aspects of Security and Privacy
Management and Querying of Encrypted Data
Science of Security
Security in Hardware
USE: User Security Behvaior
ACM CCS
Cyber Security
Database and Storage Security
Management and Querying of Encrypted Data
Hardware Security Implementation
Human and Societal Aspects of Security and Privacy
Security in Hardware
biblio
Architecture-based Self-protection: Composing and Reasoning About Denial-of-service Mitigations
Submitted by David Garlan on Wed, 09/17/2014 - 5:30pm
Architectures
Architectures
Modeling
Science of Security
Validation and Verification
CPS Technologies
Foundations
Hardware Security Implementation
validation and verification
Self-Adaptation
Security in Hardware
Science of Security
Probabilistic Model Checking
modeling
Logic and Verification
Hardware-Based Security Protocols
ACM CCS
foundations
Formal Security Models
Formal Methods and Theory of Security
Denial-of-Service
cyber security
CPS Technologies
Architectures
ACM CCS
Hardware-Based Security Protocols
Cyber Security
Formal Security Models
Formal Methods and Theory of Security
Logic and Verification
Hardware Security Implementation
Security in Hardware