Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Runtime
biblio
MinerRay: Semantics-Aware Analysis for Ever-Evolving Cryptojacking Detection
Submitted by grigby1 on Wed, 02/10/2021 - 12:12pm
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Cryptography
Runtime
Browsers
Semantics
Systematics
Hash functions
Focusing
cryptomining
cryptojacking
Webassembly
biblio
Key Generation for Zero Steganography Using DNA Sequences
Submitted by aekwall on Mon, 02/08/2021 - 12:52pm
flipping operations
image sequences
DNA cryptography
DNA sequences
steganalysis algorithms
cover image
binary code representation
Boats
DNA key generation
Steganography
Image databases
image synthesis
key generation algorithm
low cracking probability
shifting operations
steganographic approach
stego-key generation
zero steganography
privacy
Runtime
security
information security
Resiliency
Human behavior
pubcrawl
data encapsulation
Image coding
Cryptography
probability
DNA
image representation
Resists
object detection
Predictive Metrics
data hiding
Binary codes
biblio
Neural Style Transfer for Picture with Gradient Gram Matrix Description
Submitted by aekwall on Mon, 02/01/2021 - 10:42am
neural style transfer
texture style
texture expression
texture details
stylized pictures
style loss
picture stylize
output stylized picture
muddiness
gradient gram matrix description
Gradient Gram matrix
Gradient Gram description
art style transfer
Scalability
Electrical Engineering
image texture
US Department of Defense
Predictive Metrics
Image reconstruction
automation
matrix algebra
pubcrawl
Resiliency
Runtime
Internet of Things
biblio
Situational Trust in Self-aware Collaborating Systems
Submitted by aekwall on Mon, 02/01/2021 - 10:39am
autonomy
situational trust
self-awareness
self-aware collaborating systems
integrating systems
human trust
Interaction
autonomous system
ethics
autonomous systems
Conferences
groupware
collaboration
trust
biology
pubcrawl
Human behavior
Trusted Computing
Task Analysis
Runtime
biblio
Runtime Enforcement for Control System Security
Submitted by aekwall on Mon, 01/25/2021 - 11:52am
observable actions
alphabet P
classical properties
corrupted controllers
cyber components
enforceable regular expression e
external events
heterogeneous physical components
incorrect actions
industrial facilities
Ligatti et al.
monitored controllers
nonobvious properties
ad-hoc sub-class
physical processes
PLC malware
potentially compromised controllers
Process calculus
programmable logic controllers
Regan's Timed Process Language
runtime enforcement
runtime enforcement techniques
specification compliance
synthesis algorithm
timed property
program verification
Monitoring
Runtime
security
critical infrastructures
Industrial Control Systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
process control
security breaches
security of data
sensors
automata
industrial control
Cyber-physical attacks
actuators
control system security
actuator security
explosion
Smart Systems
controller
formal languages
biblio
CRA: Enabling Data-Intensive Applications in Containerized Environments
Submitted by grigby1 on Fri, 12/11/2020 - 2:01pm
cloud-edge applications
Metadata Discovery Problem
resource orchestration capabilities
Kubernetes/Docker
Kubernetes
generic dataflow layer
Docker
dataflow processing
Data-Intensive Applications
containerization technologies
containerization
common runtime for applications
cloud-scale data centers
Cloud Computing
data centers
distributed
computer centres
Compositionality
Containers
Libraries
Runtime
metadata
Scalability
Resiliency
resilience
pubcrawl
biblio
Boot time Bitstream Authentication for FPGAs
Submitted by aekwall on Mon, 12/07/2020 - 11:26am
authentication
composability
cyber-physical system security
encryption
field programmable gate arrays
Hardware
neural style transfer
Predictive Metrics
pubcrawl
Resiliency
Runtime
Scalability
Software
trusted platform modules
biblio
Mixed-Trust Computing for Real-Time Systems
Submitted by grigby1 on Wed, 12/02/2020 - 1:14pm
Runtime
VM hosting
virtual machines
untrusted components
trusted hypervisor
Trusted Computing
trust
traditional verification methods
timing guarantees
timing
Task Analysis
scheduling
safety-critical software
safety-critical autonomous features
Safety
complex cyber-physical systems
real-time systems
real-time mixed-trust computing framework
Raspberry Pi 3 implementation
pubcrawl
program verification
Human Factors
Human behavior
framework design
drone application
CPS critical functions
Computing Theory
Computational modeling
Complexity theory
biblio
High-Quality Fault-Resiliency in Fat-Tree Networks (Extended Abstract)
Submitted by grigby1 on Wed, 12/02/2020 - 1:01pm
massive topology degradation
fabric management
Fabrics
fast deterministic routing algorithm
fat tree
Fat-tree networks
Fault resiliency
forwarding tables
high-quality fault-resiliency
high-quality routing tables
HPC systems
InfiniBand control software
interconnection networks
large-scale HPC clusters
equipment failure
modulo-based computation
near-optimal SP congestion risk
OpenSM
optimized routing algorithms
Parallel Generalized Fat-Trees
PGFT
pre-modulo division
random degradation
random permutation
routing tables
RP congestion
shift permutation
network topology
resilience
Resiliency
Scalability
fault tolerant computing
Topology
Routing
telecommunication network routing
telecommunication traffic
Runtime
parallel processing
trees (mathematics)
computer networks
pubcrawl
optimisation
static analysis
Clustering algorithms
telecommunication network topology
Degradation
HPC
coupled congestion control
A2A congestion
all-to-all traffic patterns
congestion risk
coupling regular topologies
Dmodc
biblio
Guest Editor's Introduction: Special Section on Services and Software Engineering Towards Internetware
Submitted by aekwall on Mon, 11/30/2020 - 11:05am
Cloud Computing
programming
Runtime
Resiliency
Human behavior
pubcrawl
composability
Metrics
Software systems
policy governance
service computing
Special issues and sections
Internet-scale Computing Security
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »