Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secure systems
biblio
A Holistic Approach to Cyber Physical Systems Security and Resilience
Submitted by grigby1 on Mon, 03/29/2021 - 11:57am
software assurance
resilience
Resiliency
Resilient Systems
Risk
SAE G-32 Cyber Physical Systems Security Committee
secure systems
security
security of data
Software
pubcrawl
standards
supply chains
system integrators
system security
system security considerations
systems engineering
threats
Trustworthy Systems
Vulnerability
firmware assurance
affordable systems
composability
computer security
cyber
cyber physical system security framework
cyber weaknesses
cyber-physical systems
cybersecurity.
embedded systems
CPS resilience
global supply chain
Hardware
Hardware Assurance
holistic approach
holistic systems engineering approach
Industries
Metrics
Mission Assurance
biblio
Secure Real-Time Heterogeneous IoT Data Management System
Submitted by aekwall on Mon, 12/07/2020 - 12:25pm
secure platform
neural style transfer
on-device computing
performance evaluation
Predictive Metrics
pubcrawl
real-time data collection
real-time data processing system
Real-time monitoring
real-time systems
Resiliency
Scalability
machine learning
secure real-time heterogeneous IoT data management
secure systems
security
sensitive data
Software
streaming IoT data
surveillance
time data analytics system
Trusted Execution Environment
trusted platform modules
drones
cloud
Cloud Computing
composability
Cryptography
cyber-physical system security
data analysis
data privacy
Data Security
diverse IoT devices
drone-based data
authorisation
edge computing
edge device
embedded devices
end-to-end data encryption mechanism
heterogeneous data
Internet of Things
IoT
IoT devices
IOT edge computing
large-scale data analytics
biblio
Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification
Submitted by grigby1 on Fri, 08/28/2020 - 3:42pm
IITD database
Template Protection
secure systems
Scalability
Resiliency
resilience
Recognition accuracy
pubcrawl
Probes
privacy issues
permanent protection
Metrics
iris-coding
iris-biometric verification
Iris recognition
Image coding
biometric encryption
identification mode
Homomorphic encryption
Hamming distance
feature extraction
encryption domain scheme
encryption
early decision making strategy
Decision Making
Cryptography
computationally efficient application
computational overload
block-wise comparison
biometrics (access control)
biometric recognition systems
biblio
Eliminating Input-Based Attacks by Deriving Automated Encoders and Decoders from Context-Free Grammars
Submitted by grigby1 on Thu, 02/15/2018 - 11:44am
Resiliency
Human Factors
input based attack elimination
McHammerCoder
Nails
parsers
Protocols
pubcrawl
reliable systems
resilience
human factor
Scalability
secure systems
security of data
security vulnerabilities
Software systems
SQL
textual languages
unparsers
custom language
automated decoders
automated encoders
binary languages
communication language
context-free grammars
correct parsing
Cross Site Scripting
Cross Site Scripting (XSS)
cross-site scripting
arbitrary code execution
data encoding
encoding
encoding generation
formal languages
Generators
Grammar
grammars
Human behavior
biblio
Leveraging Data Provenance to Enhance Cyber Resilience
Submitted by K_Hooper on Fri, 02/02/2018 - 11:05am
Resiliency
pubcrawl
Linux
Kernel
Instruments
Electronic mail
Databases
data provenance
data integrity
cyber resilience
computer architecture
background information
security of data
secure systems
Resilient Security Architectures
biblio
In Sensors We Trust – A Realistic Possibility?
Submitted by BrandonB on Tue, 05/05/2015 - 11:43am
Data mining
computer architecture
Buildings
architecture
information dissemination
information management
information sharing
processing architecture
secure systems
security
sensing infrastructure
sensor information flow
sensors
biblio
In Sensors We Trust – A Realistic Possibility?
Submitted by BrandonB on Thu, 04/30/2015 - 1:39pm
sensors
sensor information flow
sensing infrastructure
security
secure systems
processing architecture
information sharing
information management
information dissemination
Data mining
computer architecture
Buildings
architecture