Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Compositionality
biblio
Cloud Security Analysis Based on Virtualization Technology
Submitted by grigby1 on Fri, 09/01/2023 - 2:49pm
network security
Virtualized cloud security
Information Reuse
Costs
cloud services
Trusted Computing
cloud computing security
Compositionality
Dynamic scheduling
security
composability
Computers
Hardware
Software
Resiliency
resilience
pubcrawl
biblio
TFCFI:Transparent Forward Fine-grained Control-Flow Integrity Protection
Submitted by grigby1 on Fri, 09/01/2023 - 2:48pm
composability
system security
Rockets
control-flow integrity
Information Reuse
Hardware Security
Instruction sets
Compositionality
Law
computer architecture
privacy
Hardware
Software
Resiliency
resilience
pubcrawl
security
biblio
Colored Petri Net Reusing for Service Function Chaining Validation
Submitted by grigby1 on Fri, 09/01/2023 - 2:48pm
Libraries
Configuration verification Model reuse
Colored Petri Net
Information Reuse
service function chain
service function chaining
Petri nets
Compositionality
network security
security
composability
Computational modeling
Software
Conferences
Resiliency
resilience
pubcrawl
biblio
Research on Defending Code Reuse Attack Based on Binary Rewriting
Submitted by grigby1 on Fri, 09/01/2023 - 2:48pm
Compositionality
control-flow integrity
Symbols
Information Reuse
codes
software diversity
source coding
Aerospace electronics
Semantics
security
Layout
code reuse attack
Runtime
composability
Resiliency
resilience
pubcrawl
biblio
Information Theory Based Evaluation Method For Wireless IDS: Status, Open Problem And Future Trends
Submitted by grigby1 on Fri, 09/01/2023 - 2:24pm
Wireless communication
Human Factors
Solids
information theory
information theoretic security
Market research
uncertainty
Compositionality
Measurement
network security
composability
collaboration
Entropy
wireless sensor networks
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
Intrusion Detection
biblio
Game-theoretic and Learning-aided Physical Layer Security for Multiple Intelligent Eavesdroppers
Submitted by grigby1 on Fri, 09/01/2023 - 2:24pm
Wireless communication
Multiple intelligent eavesdroppers
Human Factors
Nash Equilibrium
game theory
physical layer security
information theoretic security
Compositionality
Artificial Intelligence
Games
composability
deep learning
Protocols
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
collaboration
biblio
Implementation of Physical Layer Security into 5G NR Systems and E2E Latency Assessment
Submitted by grigby1 on Fri, 09/01/2023 - 2:23pm
Compositionality
modular coding scheme
Software-defined radio
Downlink
Human Factors
codes
URLLC
wiretap channel
physical layer security
3GPP
5G
information theoretic security
collaboration
encoding
delays
composability
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
biblio
Some Discussions on PHY Security in DF Relay
Submitted by grigby1 on Fri, 09/01/2023 - 2:23pm
probability
secrecy performance analysis
Decode-and-forward
Human Factors
Computer simulation
power system reliability
Physical layer
physical layer security
information theoretic security
Performance analysis
Compositionality
collaboration
military communication
composability
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
biblio
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds
Submitted by grigby1 on Fri, 09/01/2023 - 2:23pm
Compositionality
Success Rate
side-channel analysis
Monte-Carlo simulation
Masking Scheme
Information-Theoretic Metric
Human Factors
maximum likelihood estimation
information theoretic security
Upper bound
Monte Carlo methods
Numerical models
collaboration
Measurement
side-channel attacks
composability
Scalability
Analytical models
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
biblio
Multi-Designated Receiver Authentication-Codes with Information-Theoretic Security
Submitted by grigby1 on Fri, 09/01/2023 - 2:22pm
authentication
Broadcast Authentication
authentication codes
Galois fields
Human Factors
codes
information theoretic security
Compositionality
Receivers
composability
collaboration
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »