Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
embedded systems
biblio
Hardware Implementation of A Chaotic Pseudo Random Number Generator Based on 3D Chaotic System without Equilibrium
Submitted by
aekwall
on Mon, 11/25/2019 - 1:09pm
field programmable gate arrays
Cryptography
Hardware
embedded systems
Resiliency
pubcrawl
composability
Mathematical model
Generators
random number generation
Predictive Metrics
chaotic communication
3D chaotic flows
3D chaotic system
chaotic based digital systems
chaotic behaviors
chaotic dynamics
chaotic pseudorandom number generator
cryptography systems
deterministic chaotic systems
digital communication
digital communication systems
dynamical behavior
Dynamical Systems
Hardware Implementation
lightweight systems
low computational overhead
low-cost chaotic hardware
low-cost hardware platforms
simple nonlinear systems
three-dimensional chaotic flows
Three-dimensional displays
chaotic cryptography
biblio
Semantics-Directed Prototyping of Hardware Runtime Monitors
Submitted by
grigby1
on Mon, 11/04/2019 - 11:35am
Biomedical monitoring
building memory protection mechanisms
composability
embedded hardware
embedded processor
embedded systems
formal verification
Hardware
hardware monitor
hardware runtime monitors
Hardware Security
hardware-based protection
high level synthesis
Human behavior
Human Factors
Instruction sets
Model driven development
Monitoring
multiple memory accesses
pubcrawl
rapid-prototyping runtime monitors
reconfigurable architectures
resilience
Resiliency
rop attacks
ROP-style code reuse attacks
Runtime
Scalability
security of data
Semantics
semantics-directed prototyping
software monitor
software-based attacks
biblio
Light Database Encryption Design Utilizing Multicore Processors for Mobile Devices
Submitted by
aekwall
on Mon, 11/04/2019 - 10:23am
Cryptography
data confidentiality
encryption
performance evaluation
embedded systems
embedded devices
mobile computing
Resiliency
Human behavior
pubcrawl
composability
Metrics
Databases
Data protection
smart phones
relational databases
storage security
Performance
storage management
mobile devices
relational database security
RDBMS
commodity multicore processors
device processing resources
full disk encryption
handheld devices
light database encryption design
massive storage systems
multicore CPU
Multicore processing
multiprocessing systems
parallel database encryption system
parallel databases
SQLite databases
SQLite RDBMS
SQLite-XTS
user sensitive data
XTS encryption
biblio
Policy-Based Security Modelling and Enforcement Approach for Emerging Embedded Architectures
Submitted by
aekwall
on Tue, 10/22/2019 - 8:54am
security of data
Access Control
Hardware
Software
embedded systems
pubcrawl
policy-based governance
risk management
Policy
application threat analysis
Biological system modeling
configurable policy engine
connected vehicles
device life-cycle
DREAD risk assessment model
embedded architectures
embedded security
Guidelines
OEMs
policy update
policy-based security enforcement
policy-based security modelling
Secure by design
Security Modelling
STRIDE
STRIDE threat modelling
threat modelling
Security Policies Analysis
biblio
Hardware Implementation of Dynamic Key Value Based Stream Cipher Using Chaotic Logistic Map
Submitted by
grigby1
on Tue, 10/08/2019 - 3:44pm
asymmetric key chaos based cryptography
binary sequence
binary sequences
chaos
Chaos based cryptography
chaotic logistic map
Ciphers
dynamic key value based stream cipher
embedded systems
field programmable gate arrays
Field programmable gated array
FPGA device
frequency 62.2 MHz
Hardware
Hardware Security
hardware-based embedded system
Human behavior
key scheduling
key stream
logistic map
Logistics
Metrics
NIST statistical
nonrecursive key
private key cryptography
PRNG
pseudorandom number generation
pseudorandom sequence generation
pubcrawl
public key cryptography
random key generation
random number generation
Random sequences
randomness tests
resilience
Resiliency
Scalability
stream cipher
symmetric key chaos based cryptography
Thermal analysis
Verilog HDL
X-power
Xilinx device
biblio
AirborneCPS: A Simulator for Functional Dependencies in Cyber Physical Systems: A Traffic Collision Avoidance System Implementation
Submitted by
grigby1
on Mon, 08/26/2019 - 10:06am
air traffic control
Aircraft
automobiles
Brakes
collision avoidance
Collision Avoidance System
Compositionality
CPS
Cyber Dependencies
Cyber Physical System
cyber-physical systems
embedded systems
functional dependencies
Functional Dependency
Human behavior
Human Factors
Metrics
powerful communication networks
pubcrawl
resilience
Resiliency
road traffic
Runtime
runtime behavior
Scalability
Simulator
traffic collision avoidance system implementation
Transponders
undesired functional interaction
unforeseen runtime behavior
biblio
DLGraph: Malware Detection Using Deep Learning and Graph Embedding
Submitted by
grigby1
on Mon, 06/10/2019 - 12:59pm
application program interfaces
combined feature vector classification
deep learning
DLGraph
embedded systems
embedded vector
feature extraction
function-call graph
function-call graphs
graph embedding
graph theory
Human behavior
invasive software
learning (artificial intelligence)
Malware Analysis
malware detection
Metrics
microsoft windows
neural nets
noise reduction
pattern classification
privacy
pubcrawl
representation learning
Resiliency
SDA
softmax regression
stacked denoising autoencoders
static analysis
Trojan horses
Windows API calls
Windows application programming interface calls
biblio
Evaluating the effects of cyber-attacks on cyber physical systems using a hardware-in-the-loop simulation testbed
Submitted by
willirn1
on Fri, 05/31/2019 - 9:41am
System-security co-design
actuation capability
Analytical models
Computational modeling
computer architecture
computer security
CPS attack experiments
cyber components
cyber physical systems
cyber-attack effect evaluation
cyber-physical system
cyber-physical systems
cybersecurity design process
embedded computers
embedded systems
Experimentation
Hardware
hardware-in-the loop simulation
hardware-in-the-loop
hardware-in-the-loop simulation testbed
HIL testbed
model based software development framework
Model Integrated Computing
physical components
physical system
platform specific performance measurements
railway transportation system
resilience
security of data
simulation environment
Software
software engineering
system functions
testbed
Vanderbilt
vulnerability assessment
biblio
Attack Modeling and Verification for Connected System Security
Submitted by
aekwall
on Wed, 05/01/2019 - 12:05pm
Adaptation models
Attack Modeling
composability
connected system security
critical systems
dynamic system modeling
Dynamical Systems
embedded systems
error detection
error propagation
extended attack tree
Formal Specification
IoT
Metrics
model checker
model checking
Petri nets
program diagnostics
program verification
pubcrawl
Resiliency
security
security of data
Software Architecture
software tools
static system modeling
SysML
SysML connectivity profile
system security specifications
system specifications
system validation
system verification
systems engineering
Systems modeling
Temporal Logic
Unified modeling language
biblio
Detecting Authentication-Bypass Flaws in a Large Scale of IoT Embedded Web Servers
Submitted by
aekwall
on Wed, 05/01/2019 - 11:43am
Router Systems Security
automated
composability
embedded systems
IoT firmware
large scale
Metrics
pubcrawl
Resiliency
vulnerability detection
1
2
3
4
5
6
7
8
9
next ›
last »