Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
trusted platform modules
biblio
Boot time Bitstream Authentication for FPGAs
Submitted by aekwall on Mon, 12/07/2020 - 11:26am
authentication
composability
cyber-physical system security
encryption
field programmable gate arrays
Hardware
neural style transfer
Predictive Metrics
pubcrawl
Resiliency
Runtime
Scalability
Software
trusted platform modules
biblio
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation
Submitted by aekwall on Mon, 12/07/2020 - 11:25am
Analytical models
authentication
composability
Cryptographic Protocols
cryptographic scheme
cyber-physical system security
digital signatures
direct anonymous attestation
ECC-based direct anonymous attestation
ECC-based version
ECC-DAA
expected authentication
formal analysis
formal verification
IEC standards
ISO standards
mechanised analysis
neural style transfer
Predictive Metrics
privacy
pubcrawl
public key cryptography
Resiliency
Scalability
secrecy
secrecy properties
symbol manipulation
symbolic analysis
symbolic verification
Tamarin modelling
Tamarin prover
tpm
Trusted Computing
trusted platform module TPM-backed anonymous credentials
trusted platform modules
biblio
Secure Real-Time Heterogeneous IoT Data Management System
Submitted by aekwall on Mon, 12/07/2020 - 11:25am
authorisation
cloud
Cloud Computing
composability
Cryptography
cyber-physical system security
data analysis
data privacy
Data Security
diverse IoT devices
drone-based data
drones
edge computing
edge device
embedded devices
end-to-end data encryption mechanism
heterogeneous data
Internet of Things
IoT
IoT devices
IOT edge computing
large-scale data analytics
machine learning
neural style transfer
on-device computing
performance evaluation
Predictive Metrics
pubcrawl
real-time data collection
real-time data processing system
Real-time monitoring
real-time systems
Resiliency
Scalability
secure platform
secure real-time heterogeneous IoT data management
secure systems
security
sensitive data
Software
streaming IoT data
surveillance
time data analytics system
Trusted Execution Environment
trusted platform modules
biblio
Remote Attestation based Software Integrity of IoT devices
Submitted by aekwall on Mon, 12/07/2020 - 11:24am
antivirus
composability
cryptographic operations
Cryptographic Protocols
Cryptography
cyber-physical system security
hashed message authentication code
HMAC
HMAC values
Internet of Things
IoT
IoT devices
message authentication
neural style transfer
Predictive Metrics
pubcrawl
reasonable computational power
Resiliency
Scalability
security issues
software integrity
software trusted platform module
telecommunication security
tpm
Trusted Computing
trusted platform modules
trusted solution
biblio
Security Domain for the Sensor Nodes with Strong Authentication
Submitted by aekwall on Mon, 12/07/2020 - 11:24am
authentication
authorisation
composability
cooperating mobile sensor nodes
cryptographic protection
Cryptography
cyber-physical system security
data exchange
data link layer
Data protection
data source authentication
data transmission security
domain member
energy resources
Internet of Things
IoT solutions
Logic gates
military applications
military communication
mobile radio
neural style transfer
Predictive Metrics
processing power
pubcrawl
Resiliency
Scalability
security domain
security in IoT
sensor node resources
sensory data
tpm
Trusted Platform Module
trusted platform modules
Wireless communication
wireless sensor networks
biblio
Dominance as a New Trusted Computing Primitive for the Internet of Things
Submitted by aekwall on Mon, 12/07/2020 - 11:24am
Authenticated-Watchdog-Timer
central entity
CIDER performance overhead
CIDER system
composability
cyber-physical system security
dominant computing paradigms
firmware
firmware image
geographical area
Hardware
HummingBoard Edge
Internet of Things
Internet-of-Things
IoT
IoT hardware
IoT platforms
large-scale industrial deployments
large-scale IoT deployments
Latches
mainstream IoT devices
neural style transfer
Nucleo-L476RG
operating systems
Predictive Metrics
pubcrawl
Raspberry Pi Compute Module 3
resilience
Resiliency
Scalability
security of data
sensors
separate service processors
Servers
Trusted Computing
trusted platform modules
biblio
Physical Unclonable Functions (PUFs) Entangled Trusted Computing Base
Submitted by aekwall on Mon, 12/07/2020 - 11:23am
Clocks
composability
copy protection
cyber-physical system security
data-dependent delay
delays
digital signatures
field programmable gate arrays
logic circuits
logic design
microprocessor chips
neural style transfer
particular program instruction
physical unclonable functions
Pollution measurement
Predictive Metrics
processor chip ALU silicon biometrics
program execution
pubcrawl
Reliability
Resiliency
Scalability
Semiconductor device measurement
Software
software instruction
Software measurement
software measurement physical unclonable function
SW-PUF measurements
Trusted Computing
trusted computing base
trusted platform modules
biblio
Study of Trust at Device Level of the Internet of Things Architecture
Submitted by aekwall on Mon, 12/07/2020 - 11:23am
authentication
basic firewall protection
built-in security features
composability
Computational modeling
computer architecture
Cryptography
cyber-physical system security
device level encryption
device management
encryption
examined IoT solutions
general Internet of Things architecture
Internet of Things
IoT architecture model
IoT devices
IoT security solutions
Logic gates
neural style transfer
Object recognition
Predictive Metrics
pubcrawl
Resiliency
Scalability
security risk
security risks
tamper proof
telecommunication security
Trusted Computing
Trusted Platform Module
trusted platform modules
unique device identifier
user authentication
biblio
Research on Trusted Authentication Model and Mechanism of Data Fusion
Submitted by aekwall on Mon, 12/07/2020 - 11:23am
authentication
authorisation
CAS
composability
cyber-physical system security
data fusion
Data integration
Data mining
Data models
database design
Databases
information fusion
JA-SIG CAS
marine engineering
Marine vehicles
Media
message authentication
neural style transfer
Predictive Metrics
pubcrawl
Resiliency
Scalability
sensor fusion
service model
ship cluster platform
ships
software engineering
system design framework
system requirements
Trusted Authentication
trusted authentication model
Trusted Computing
trusted platform modules
unified authentication platform
biblio
A Dynamic Security Control Architecture for Industrial Cyber-Physical System
Submitted by grigby1 on Fri, 10/16/2020 - 10:31am
composability
Resiliency
cyber-physical system security
trusted platform modules
Anomaly Detection
control system security
control systems
Cryptography
data fusion
dynamic security control architecture
dynamic security control strategy
Dynamic strategy
firewalls
Firewalls (computing)
hardware encryption
ICs
industrial control
industrial control system
Industrial Control Systems
industrial cyber-physical system
information security
information security requirements
internal fire control wall
intrusion detection system
linkage verification
Protocols
pubcrawl
resilience
Scalability
secure industrial control information security system
Servers
Trusted Computing
trusted connection server
Trusted Platform Module
1
2
3
4
next ›
last »