Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Linux
biblio
LoRa Mesh Network with BeagleBone Black
Submitted by aekwall on Mon, 03/01/2021 - 3:43pm
IoT
Internet of Things
Linux
Resiliency
pubcrawl
composability
Synchronization
Wireless communication
Metrics
Python
Bandwidth
Mesh networks
wireless mesh networks
Computers
encoding
relay networks (telecommunication)
relay
Low power
spread spectrum communication
radio transceivers
transceivers
BeagleBone Black
BeagleBone Black wireless single-board Linux computers
chirp spread spectrum
coding rate
long range
long range transceivers
lora
LoRa mesh network
LoRa node
MESH network
Python code
receiving nodes
spread factor
transmission intervals
transmitting nodes
Wireless Mesh Network Security
biblio
Covert Channels of Data Communication
Submitted by grigby1 on Wed, 02/10/2021 - 11:50am
authorisation
pubcrawl
resilience
Resiliency
Scalability
Access Control
security threats
Linux
Compositionality
confidential information
covert storage channels
covert channels
data communication
Linux kernel
Linux operating system
mandatory access control
protected operating system
biblio
Analysis of Rabin-P and RSA-OAEP Encryption Scheme on Microprocessor Platform
Submitted by aekwall on Mon, 01/25/2021 - 11:57am
encryption
Internet of Things
Raspberry Pi
embedded devices
Linux
Resiliency
Human behavior
pubcrawl
composability
Metrics
public key cryptography
energy consumption
microprocessor chips
decryption process
Asymmetric Encryption
Linux operating system
Internet of Things structure
microprocessor platform
Optimal Asymmetric Encryption Padding (OAEP)
Rabin-p
Rabin-p cryptosystem
Rabin-P encryption scheme
Raspberry Pi setup
Raspbian
Raspbian OS
Rivest-Shamir-Adleman (RSA)
RSA-OAEP cryptosystem
RSA-OAEP encryption scheme
biblio
Design of Intelligent Home Security Monitoring System Based on Android
Submitted by aekwall on Mon, 11/23/2020 - 10:22am
security
Scalability
Internet of Things
embedded systems
Linux
Resiliency
pubcrawl
neural nets
Neurons
internet
telecommunication network routing
condition monitoring
microcontrollers
network nodes
computerised monitoring
Logic gates
control engineering computing
home computing
internetworking
Neural networks
Android (operating system)
Compositionality
Androids
Humanoid robots
carrier transmission on power lines
Water heating
embedded Linux
remote monitoring
Temperature distribution
intelligent devices
Android remote operation
domestic appliances
health status monitoring
intelligent electrical appliances
Intelligent home
intelligent home condition monitoring
intelligent home drivers development
intelligent home safety assessment
intelligent home security monitoring system
intelligent home-based remote monitoring system
Internet-based Internet-of-Things technology
MVP mode
MVP model
network congestion
network data model
Operational Data
Power Line Communication
power line communication network
routing nodes
S3C2440A microcontrollers
safety monitoring
system data
Intelligent Data Security
Intelligent Data and Security
biblio
Design and Implementation of Azalea unikernel file IO offload
Submitted by grigby1 on Fri, 10/30/2020 - 11:18am
I-O Systems
i-o systems security
security
azalea unikernel file IO offload
file IO command
file IO result
file organisation
file server
file servers
file system
File systems
input-output programs
Io offload
Kernel
Libraries
Linux
Offloading
operating system kernels
operating systems
operating systems (computers)
pubcrawl
Scalability
software libraries
storage management
Telecommunications
unikernel
unikernel transfers
biblio
Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries
Submitted by grigby1 on Fri, 10/30/2020 - 11:15am
i-o systems security
I-O Systems
security
advanced Memway algorithm
application program interfaces
binary relocation step
cache storage
Computer bugs
disk
DRAM chips
Dynamic Random Access Memory cells
exploitable physical addresses
Hardware
Heuristic algorithms
in-memory swapping
in-memory waylaying acceleration
input-output programs
Kernel
Linux
Linux page cache
Linux tmpfs
mainstream platforms
Memway+fadvise relocation scheme
microarchitectural security threat
page cache eviction
parallel processing
powerful privilege-escalation attacks
program diagnostics
proof-of-concept Waylaying algorithm
pubcrawl
Random access memory
rowhammer attacks
Rowhammer bug
running time
Scalability
security of data
system memory
system monitoring
time 15.0 min to 200.0 min
unprivileged instructions
unprivileged posix fadvise API
victim binary
Waylaying algorithm
Waylaying method
biblio
Performance Enhancement of Snort IDS through Kernel Modification
Submitted by aekwall on Mon, 10/26/2020 - 10:47am
composability
high traffic load
Intrusion Detection
Kernel
Kernel modification
kernel modifications
Kernel subsystem
Linux
Linux kernel networking subsystem
Linux key parameters
Linux Operating System Security
Measurement
Metrics
Monitoring
NAPI packet reception mechanism
NAPI throughput
open-source intrusion detection system
operating system kernels
Packet loss
performance enhancement
performance enhancement metrics
Predictive Metrics
pubcrawl
Resiliency
security of data
Snort IDS
snort packet handling capacity
Snort performance
Task Analysis
telecommunication traffic
biblio
Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries
Submitted by aekwall on Mon, 10/26/2020 - 10:46am
IoT
security of data
Internet of Things
security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
Metrics
Data mining
public domain software
firmware
Security analysis
reverse engineering
Heuristic algorithms
program verification
control engineering computing
Semantics
Software algorithms
Predictive Metrics
Binary codes
operating system kernels
algorithmic level
algorithm-level semantics
binary patching
control algorithm
control algorithm parameters
critical cyber-physical IoT devices hinges
Cyber Physical System
cyber-physical execution semantic information
cyber-physical execution semantics
cyber-physical IoT control application domains
cyber-physical security flaws
domain-specific reverse engineering framework
domain-specific semantic information
dynamic selective memory protection
embedded binary code
embedded controller software binaries
embedded IoT controller software binaries
executables
Execution Semantic
firmware binaries
firmware vulnerability assessment
high-level algorithmic expressions
Linux kernel controllers versions
low-level binary symbolic values
memory forensics analysis
MISMO
reverse engineering outcomes
robotics
semantic-matching
state estimation algorithms
Symbolic Comparison
Symbolic Expression
targeted memory data attacks
Linux Operating System Security
biblio
Linux Security: A Survey
Submitted by aekwall on Mon, 10/26/2020 - 10:46am
authorisation
malware
security
invasive software
Linux
Resiliency
pubcrawl
composability
Metrics
Business
password
microsoft windows
Predictive Metrics
firewall
antivirus
File
file permissions
firewall security
Linux security
Linux Operating System Security
biblio
PrivAnalyzer: Measuring the Efficacy of Linux Privilege Use
Submitted by aekwall on Mon, 10/26/2020 - 10:46am
security
security of data
Access Control
Program processors
Linux
Resiliency
pubcrawl
composability
Metrics
tools
Analytical models
Containers
program diagnostics
Predictive Metrics
program compilers
formal verification
static analysis
verification
dynamic analysis
operating systems
AutoPriv
ChronoPriv
Linux privilege use
Linux privileges
LLVM-based C/C++ compiler
PrivAnalyzer
privilege escalation attacks
privileged open source programs
ROSA model checker
term rewriting
Linux Operating System Security
1
2
3
4
5
6
7
8
next ›
last »