Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Production
biblio
Mystic: Mystifying IP Cores Using an Always-ON FSM Obfuscation Method
Submitted by aekwall on Mon, 11/09/2020 - 1:32pm
integrated circuit industry
IP piracy
application specific integrated circuits
ASIC technology
circuit complexity
combinational circuits
finite state machine
FSM obfuscation method
hardware obfuscation method
Hardware Security
IP overproduction
ITC99 circuit benchmarks
logic encryption
Logic masking
Mystic obfuscation approach
Mystic protection method
mystifying IP cores
Logic gates
Hardware
Resiliency
pubcrawl
composability
policy-based governance
Production
Complexity theory
microprocessor chips
IP networks
obfuscation
reverse engineering
encoding
finite state machines
logic circuits
logic design
size 45.0 nm
biblio
Development of Quantitative Methods for Evaluating Intellectual Resources in the Digital Economy
Submitted by grigby1 on Mon, 11/02/2020 - 1:35pm
mathematical approach
valuation of intellectual resources
uncertainty
Technological innovation
Resiliency
resilience
quantitative methods
quantitative evaluation
pubcrawl
Production
policy-based governance
capitalization
intellectual resources
intellectual property valuation
intellectual property security
intellectual property
Industries
industrial property
Economics
digital economy
Cost accounting
composability
biblio
Improving MPI Collective I/O for High Volume Non-Contiguous Requests With Intra-Node Aggregation
Submitted by grigby1 on Fri, 10/30/2020 - 12:19pm
MPI collective I/O
Writing
two-phase I/O
security
Scalability
request redistribution
pubcrawl
Program processors
Production
performance evaluation
parallel processing
parallel jobs
Parallel I/O
non-contiguous I/O
MPI processes
Aggregates
message passing
Libraries
intranode aggregation
internode communication contention
Intel KNL
input-output programs
i-o systems security
I-O Systems
high volume noncontiguous requests
Haswell processors
Cray XC40 parallel computers
collective MPI-IO functions
Benchmark testing
biblio
SCMiner: Localizing System-Level Concurrency Faults from Large System Call Traces
Submitted by grigby1 on Tue, 10/06/2020 - 2:01pm
Resiliency
multiple processes
practical online bug diagnosis tool
principal component analysis
Production
production system
program debugging
program diagnostics
program testing
pubcrawl
resilience
multiple failing executions
scheduling
SCMiner
security
security of data
statistical analysis
statistical anomaly detection techniques
system call traces
System Level
system-level concurrency fault
tools
event handlers
Computer bugs
Concurrency
concurrency (computers)
Concurrency Failures
Concurrent computing
CPS
cyber physical systems
Data mining
debugging
default system audit tools
composability
failure-inducing system call sequences
fault diagnosis
fault localization
file content
Instruments
interleaving schedule
localizing system-level concurrency faults
Metrics
Multi Process Applications
biblio
Sandnet: Towards High Quality of Deception in Container-Based Microservice Architectures
Submitted by aekwall on Mon, 09/21/2020 - 3:46pm
Attack Strategies
confinement
vulnerable production network
suspicious microservices
security incidents
sandnet
sandbox network
quarantined services
QoD
Production systems
open production network
network deception mechanisms
live confinement
evaluation scenario
container-based microservice architectures
Cloning
computer network security
Degradation
Switches
computer viruses
Containers
cyber-physical systems
sandboxing
Measurement
threat intelligence
privacy
Production
composability
pubcrawl
Resiliency
system monitoring
security
biblio
Industrial Control Network Security Analysis and Decision-Making by Reasoning Method Based on Strong Relevant Logic
Submitted by aekwall on Mon, 08/24/2020 - 12:47pm
cognition
Autonomic Security
strong relevant logic
reasoning method
industrial control network security analysis
Industrial control network
forward reasoning
formal logic
industrial control network system
inference mechanisms
industrial control
computer network security
Security analysis
Communication networks
computer security
decision-making
Decision Making
Production
composability
pubcrawl
Resiliency
biblio
Test-Driven Anonymization for Artificial Intelligence
Submitted by grigby1 on Thu, 08/13/2020 - 5:07pm
anonymization efforts
artificial intelligence security
test-driven anonymization approach
Software Testing
regulatory requirements
Privacy Protections
nonfunctional quality
k-anonymity
internal requirements
Insurance
functional suitability
functional quality
classification AIs
artificial intelligence tools
anonymized data
anonymization techniques
tools
anonymization
AI context
artificial intelligence technique
testing
Data protection
pattern classification
Production
health care
data privacy
Data models
pubcrawl
Artificial Intelligence
Predictive models
security of data
biblio
A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications
Submitted by grigby1 on Fri, 05/08/2020 - 2:20pm
OPC UA
unified data model
unified communication architecture
standards
Security Requirements Modeling
security requirement communication
security of data
security
SCADA Security
Resiliency
resilience
pubcrawl
production engineering computing
Production
open platform communications
OPC UA server
composability
object oriented security
Object oriented modeling
Metrics
machine-readable data model
Internet of Things
Industries
industrial IoT security requirements
industrial infrastructures
Industrial Control Systems
industrial control system security
industrial control
Germany
fourth industrial revolution
Data models
biblio
Securing Industrial Remote Maintenance Sessions using Software-Defined Networking
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
Production
XACML
untrustworthy external networks
software-defined networking
software defined networking
Software
security of data
security
SDN
Router Systems Security
Resiliency
resilience
pubcrawl
production engineering computing
ABAC
network security
Metrics
manufacturing industry
Manufacturing industries
maintenance engineering
internet
industrial remote maintenance session security
industrial remote maintenance
industrial networks
industrial network
considerable economic advantages
Communication networks
Business
biblio
Parallel Verification of Software Architecture Design
Submitted by aekwall on Mon, 03/16/2020 - 10:39am
object-oriented programming
software architecture verification
software architecture design
parallel verification
multithreaded environment
multi-threading
monolithic architecture
large-scale complex software systems
component-based software system
Component-Based Software
Circular Dependency
Bottleneck
scalable verification
computer architecture
Compositionality
Predictive Metrics
Scalability
program verification
model checking
Software Architecture
Unified modeling language
Software systems
Production
pubcrawl
Resiliency
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »