Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SoC
biblio
System on Chip (SoC) Security Architecture Framework for Isolated Domains Against Threats
Submitted by grigby1 on Fri, 02/17/2023 - 5:10pm
secure system
SoC
isolated domains
arm
policy governance
sandboxing
Embedded System
threats
embedded systems
Robustness
computer architecture
side-channel attacks
composability
system-on-chip
Safety
security
Hardware
pubcrawl
collaboration
biblio
Designing a Framework of an Integrated Network and Security Operation Center: A Convergence Approach
Submitted by grigby1 on Fri, 01/06/2023 - 4:02pm
SQL injection
SoC
PPTGC
NoC
Nervous system
layered framework
Integrated network and security operation center
INSOC
convergence
Pandemics
Air gaps
Organizations
Phishing
network security
composability
process control
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Metrics for Assessing Security of System-on-Chip
Submitted by grigby1 on Thu, 01/05/2023 - 5:39pm
pubcrawl
Metrics
Hardware
Benchmark testing
side-channel attacks
Measurement
Vulnerability
Systematics
supply chains
SoC
threat
mathematical models
impact
supply chain risk assessment
biblio
CARE: Lightweight Attack Resilient Secure Boot Architecture with Onboard Recovery for RISC-V based SOC
Submitted by aekwall on Thu, 12/01/2022 - 4:37pm
malware
Resilient Security Architectures
smart recovery
small embedded and IoT devices security system
RISC-V
HW/SW co-design
hardware and system security
attack resilient
Secure Boot
Hardware
Performance analysis
Prototypes
Resiliency
pubcrawl
tools
performance evaluation
Internet of Things
SoC
biblio
Endpoint Cloud Terminal as an Approach to Secure the Use of an Enterprise Private Cloud
Submitted by grigby1 on Thu, 09/16/2021 - 4:07pm
Metrics
Workstations
Virtualization
Software
SoC
security
Scientific Computing Security
Resiliency
resilience
pubcrawl
cloud
KVM
information security
Hardware
endpoint cloud terminal
Employment
computer security
Compositionality
Cloud Computing
biblio
Real-time Face Tracking in Surveillance Videos on Chips for Valuable Face Capturing
Submitted by aekwall on Wed, 07/07/2021 - 4:58pm
Task Analysis
SoC
real-time systems
surveillance
video surveillance
Videos
estimation
face quality estimation
face recognition
face tracking
Inference algorithms
pubcrawl
Metrics
Resiliency
Human behavior
biblio
FPGA Accelerated Embedded System Security Through Hardware Isolation
Submitted by aekwall on Mon, 06/28/2021 - 12:40pm
field programmable gate arrays
FPGA
Hardware
security
Software
SoC
Resiliency
pubcrawl
composability
policy-based governance
embedded systems
system-on-chip
Acceleration
Embedded System
Domain Isolation
intellectual property security
biblio
Continuous Compliance
Submitted by aekwall on Mon, 03/22/2021 - 1:08pm
continuous compliance process
Open Source Software
Manuals
key length
SoC
PCI DSS
auditing source code
cloud data stores
compliance certificate
encryption audits
cryptographically unsafe algorithms
FedRAMP
Hard-coded credentials
large cloud-services company
lightweight verification tools
open-source software
pluggable type systems
source-code compliance requirement
Production
Cryptography
Data Security
data privacy
Resiliency
pubcrawl
Compliance
standards
tools
Cloud Computing
Industries
software engineering
public domain software
encryption
program diagnostics
program verification
Predictive Metrics
Compositionality
biblio
Dynamic security management driven by situations: An exploratory analysis of logs for the identification of security situations
Submitted by grigby1 on Fri, 11/20/2020 - 2:27pm
NotPetya
WannaCry
SoC
situation-driven framework
SIEM
security situation
Security Policies Analysis
security operation centers
security incident
security administrators
Radar
pubcrawl
policy-based governance
APT
networks security experts
machine learning based approaches
loC
learning (artificial intelligence)
Intrusion Detection
event management solutions
dynSMAUG
dynamic security management
cyberattacks
computer network security
CEP
biblio
WASPP: Workflow Automation for Security Policy Procedures
Submitted by aekwall on Mon, 08/24/2020 - 12:41pm
organisational aspects
workflow automation
WASPP
University networks
tools
Systematics
suspicious event
SoC
security policy procedures
Security Operations Center
security of data
pubcrawl
Pipelines
Information Reuse and Security
Monitoring
information security specialists
human intuition
generalized event response solutions
composability
automation
Automated Response Actions
automated event response solutions
administrative policies
ad hoc solutions
Resiliency
Compositionality
1
2
3
next ›
last »