Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Space exploration
biblio
BLACKSMITH: Scalable Rowhammering in the Frequency Domain
Submitted by grigby1 on Mon, 02/13/2023 - 2:59pm
security
pubcrawl
Scalability
privacy
Production
Random access memory
frequency-domain analysis
Space exploration
Scalable Security
Behavioral sciences
biblio
Exploiting Resiliency for Kernel-Wise CNN Approximation Enabled by Adaptive Hardware Design
Submitted by grigby1 on Fri, 11/18/2022 - 5:45pm
neural network resiliency
CNN inference
AI Accelerator
image classification
Space exploration
Quantization (signal)
Proposals
Hardware
Resiliency
resilience
pubcrawl
computer architecture
biblio
Cyber-Physical System Security of Surface Ships using Intelligent Constraints
Submitted by aekwall on Mon, 12/20/2021 - 12:15pm
Computing Theory
resilience
actuator security
actuators
composability
Conferences
control systems
cyber-physical systems
dynamics
Human behavior
Marine vehicles
Metrics
pubcrawl
Resiliency
Space exploration
biblio
PowerScout: A Security-Oriented Power Delivery Network Modeling Framework for Cross-Domain Side-Channel Analysis
Submitted by aekwall on Mon, 11/08/2021 - 3:28pm
security
simulation
Analytical models
pubcrawl
Scalability
Resiliency
side-channel attacks
Space exploration
Load modeling
Predictive Metrics
Load flow analysis
Time Frequency Analysis and Security
biblio
On Development of a Game‐Theoretic Model for Deception‐Based Security
Submitted by aekwall on Wed, 08/11/2021 - 2:55pm
security
Task Analysis
Computational modeling
Human Factors
Analytical models
Games
pubcrawl
Scalability
Resiliency
IEEE Sections
Space exploration
IoBT Security
biblio
A Hole in the Ladder : Interleaved Variables in Iterative Conditional Branching
Submitted by aekwall on Mon, 03/22/2021 - 1:14pm
exponentiation
semiinterleaved ladders
RSA cryptographic protocol
iterative conditional branching
interleaved variables
fully-interleaved ladders
fully-interleaved ladder properties
fully-interleaved cases
Countermeasures (computer)
Iterative algorithms
Montgomery ladder
interleaved codes
fault detection
Scalability
public-key cryptography
modular exponentiation
side-channel attacks
Registers
Space exploration
public key cryptography
Mathematical model
pubcrawl
Resiliency
Cryptographic Protocols
security
Cryptography
biblio
Does visual search by neck motion improve hemispatial neglect?: An experimental study using an immersive virtual reality system
Submitted by grigby1 on Wed, 02/03/2021 - 1:09pm
privacy
VR Evaluation System
visualization
virtual reality
Unilateral Spatial Neglect
Three-dimensional displays
Space exploration
resilience
pubcrawl
immersive systems
Object recognition
object detection
Neck
Human Factors
Human behavior
Exploratory Ability
cyber physical systems
composability
biblio
Consideration of Security Attacks in the Design Space Exploration of Embedded Systems
Submitted by aekwall on Mon, 06/15/2020 - 10:55am
power consumption
security aware design space exploration framework
secure system designing
Secure IoT Systems
optimal design
Mixed Criticality Design Space Exploration
Embedded System Design
door access system use case
Design Process
behavioral security attack description
architectural security attack description
IoT system
Power demand
Space exploration
security requirements
security of data
security measures
tools
internet
Metrics
security attacks
composability
pubcrawl
Resiliency
cyber security
Bayes methods
embedded systems
Task Analysis
Internet of Things
Computer crime
biblio
Networks-on-Chip based Deep Neural Networks Accelerators for IoT Edge Devices
Submitted by grigby1 on Fri, 05/15/2020 - 12:45pm
low-power electronics
system-on-chip
Space exploration
resource-constrained embedded devices
performance evaluation
On-chip communication
NoC-based deep neural network accelerators
Neurons
neural chips
network-on-chip
network routing
memory size
Memory management
Measurement
massive parallel cores
network on chip security
IoT edge devices
Internet of Things
integrated circuit design
Energy analysis
Design Space Exploration
deep neural network inferences
Deep Neural Network accelerator
circuit optimisation
Artificial Neural Networks
Metrics
Resiliency
resilience
Scalability
biblio
Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
robust preservation
hyperproperties
linked adversarial code
linked adversarial target code
linked source code
linked target code
liveness
low-level target language
multiple programs
noninterference
property classes
relational hyperproperties
relational properties
good programming languages
robust property preservation
secure compilation
secure compilation chain
Secure interoperability
secure linking
Security Foundations
source language
source-level abstraction
strictly stronger security guarantees
supported security goals
trace properties
compiler security
Compositionality
security of data
Scalability
Resiliency
pubcrawl
Cryptography
Metrics
Libraries
program diagnostics
program verification
Writing
Space exploration
Security Properties
Safety
program compilers
secure code
source program
adversarial contexts
arbitrary adversarial contexts
compiled program
Computer languages
equivalent property-free
formal secure compilation criteria
full abstraction
fully abstract compilation chain
1
2
next ›
last »