Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
Towards Effective Genetic Trust Evaluation in Open Network
Submitted by aekwall on Mon, 11/23/2020 - 10:36am
misbehaving entities
crossover and mutation strategy
family attributes
genetic algorithm searching
genetic searching termination condition
genetic trust
genetic trust evaluation method
genetic trust search algorithm
human social trust propagation
intuitive trust
biological evolution process
optimal trust chromosome
population evolutionary searching
self-optimization
self-organization principle
self-organizing system
trust evaluation process
trust value
human trust
Genetics
Trusted Computing
network security
pubcrawl
Sociology
Statistics
genetic algorithm
genetic algorithms
IP address
IP networks
Trust management
Biological cells
search problems
open network environment
trust evaluation
Human behavior
malicious entities
behavior feedback
biblio
Data Analysis for Anomaly Detection to Secure Rail Network
Submitted by aekwall on Mon, 11/23/2020 - 10:24am
Bidirectional control
Intelligent Data and Security
Intelligent Data Security
Wireshark detection
timely detection
secure rail network
railway communication
rail systems
rail network traffic data
Rail Network Security
packet analysis system
network flow
network features
IP networks
alert function
Rails
Compositionality
data analysis
Anomaly Detection
pubcrawl
Resiliency
Support vector machines
Protocols
telecommunication security
telecommunication traffic
Scalability
biblio
Web server security evaluation method based on multi-source data
Submitted by aekwall on Mon, 11/23/2020 - 10:23am
Compositionality
Intelligent Data and Security
Intelligent Data Security
web server security evaluation method
web security evaluation model
web security evaluation
web security assessments
single data source
multisource data
multi-source data
host security threat assessment values
evaluation indicators
data sources
XML
Safety
analytic hierarchy process
information processing
web services
internet
pubcrawl
Resiliency
Data models
security
Servers
Scalability
IP networks
security of data
biblio
A Dynamic Transport Overlay System for Mission-Oriented Dispersed Computing Over IoBT
Submitted by grigby1 on Tue, 11/17/2020 - 1:50pm
QoS monitoring
NRL CORE network emulator
online learning
overlay
overlay tunnels
Path optimization
planner
protocol synthesis
pubcrawl
networking conditions
quality of service
Scalability
Software Architecture
telecommunication traffic
transport protocols
transport service needs
tunnel transport protocol optimization
tunnels
Internet of Things
dispersed computing
dispersed computing applications
dynamic overlay system
dynamic path optimization
dynamic transport overlay system
Human Factors
internet
Internet of battlefield things
application traffic
iobt
IP networks
mission-oriented dispersed computing
Nebula's overlay system
Network Backhaul Layered Architecture system
network computation points
network discovery
biblio
DVFS as a Security Failure of TrustZone-enabled Heterogeneous SoC
Submitted by grigby1 on Tue, 11/17/2020 - 1:39pm
frequency regulator
Clocks
system-on-chip
Frequency modulation
ARM TrustZone
AXI bus
DVFS
Dynamic Voltage and Frequency Scaling
embedded system security
power aware computing
nonsecure ARM core
Regulators
secure ARM core
security failure
TrustZone-enabled heterogeneous SoC
TrustZone-enabled System-on-Chip
voltage regulator
Operating systems security
Instruction sets
IP networks
Trusted Computing
pubcrawl
Metrics
Resiliency
embedded systems
composability
computer architecture
security
hardware trojan
Receivers
resilience
energy consumption
operating systems (computers)
operating systems
operating system
electronic engineering computing
biblio
A Multi-Agent Middleware for Resilience Enhancement in Heterogeneous Control Systems
Submitted by aekwall on Mon, 11/16/2020 - 1:58pm
heterogeneous control systems
multiagent framework
resilience enhancement
constituent agents
cyber disturbances
cyber space
cyber vulnerabilities
distributed middleware
ensures state
networked control systems
heterogeneous networked control systems environments
minimum level
modern computing networks
multiagent middleware
networking technologies
physical disturbances
Resilient Security Architectures
communication protocols
IP networks
security
Resiliency
pubcrawl
wireless sensor networks
Protocols
multi-agent systems
resilience
computer network security
middleware
sensors
telecommunication control
heterogeneous devices
actuators
physical world
distributed control
biblio
Multi-Agent Framework for Resilience Enhancement over a WSAN
Submitted by aekwall on Mon, 11/16/2020 - 1:49pm
networked control systems
Resilient Security Architectures
Resiliency
wireless sensor
security world
resilience enhancement
multiagent framework
IPv6 test-bed
installation costs
hierarchical multiagent system
distributed devices
actuator networks
Networked Control System
IP networks
physical world
actuators
wireless nodes
cyber world
resilience
multi-agent systems
Wireless communication
wireless sensor networks
pubcrawl
computer architecture
security
biblio
EAODBT: Efficient Auditing for Outsourced Database with Token Enforced Cloud Storage
Submitted by aekwall on Mon, 11/16/2020 - 12:10pm
database outsourcing
token enforced cloud storage
search results provability
Query Auditing
outsourcing computation
Invertible Bloom Filter
Integrity Auditing
information proprietor
efficient auditing for outsourced database
EAODBT
database privacy
database encryption
database administration
cloud service provider
Outsourced Database Integrity
security of data
outsourcing
storage management
security issues
database management systems
Reliability
Databases
Metrics
composability
pubcrawl
Resiliency
security
data privacy
IP networks
Cloud Computing
biblio
Low-Overhead Robust RTL Signature for DSP Core Protection: New Paradigm for Smart CE Design
Submitted by aekwall on Mon, 11/09/2020 - 12:41pm
low-overhead robust RTL signature
FIR filters
IP piracy
flip-flops
covert signature embedding process
digital signal processor
DSP core protection
DSP-MP IP core
IP vendors
FIR filter
Multimedia Processor
nonsignature FIR RTL design
register-transfer level
reusable Intellectual Property cores
robust IP owner
secured smart CE device
smart CE design
smart Consumer Electronics devices
Registers
Hardware
Resiliency
pubcrawl
composability
policy-based governance
digital signatures
microprocessor chips
Multiplexing
IP networks
digital signal processing chips
Finite impulse response filters
adders
logic circuits
logic design
Latches
Consumer electronics
biblio
DLockout: A Design Lockout Technique for Key Obfuscated RTL IP Designs
Submitted by aekwall on Mon, 11/09/2020 - 12:40pm
nondestructive manner
Datapath
datapath intensive IPs
Design Lockout
DLockout
key obfuscated RTL IP designs
key obfuscated RTL module
key obfuscation
key-based obfuscation techniques
legacy IP
common side-channel attacks
obfuscation logic output
overproduction
robust design lockout technique
RTL Obfuscation
semiconductor supply chain
storage capacity 128 bit
storage capacity 32 bit
storage capacity 64 bit
typical design corner
Computer crime
Cryptography
Hardware
security
Software
Resiliency
pubcrawl
composability
policy-based governance
logic locking
IP networks
process control
reverse engineering
Integrated circuit modeling
Registers
logic circuits
controller
IP piracy
applied key
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »