TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
| A | |
| abnormal node detection | |
| ACC | |
| acceptable result | |
| Access Control | |
| Adaptive Repetition | |
| algorithms | |
| Android malware family signature generation | |
| Android security | |
| Anomalies | |
| anomaly detection | |
| approximate adders | |
| ArduPilot Flight Controller | |
| Arrival rate | |
| atomicity | |
| attacker model | |
| Authorization | |
| autonomous vehicle | |
| Autonomous Vehicles | |
| B | |
| Bag of words | |
| binary analysis | |
| binary equivalence | |
| binary rejuvenation | |
| bit-flips | |
| Bitcoin | |
| blockchain | |
| botnet detection | |
| C | |
| Certificateless PKC | |
| Chipkill | |
| Cloud computing service | |
| Cloud security | |
| coarse grain lockstep | |
| combinatorial interaction testing | |
| Conformance Testing | |
| constrained covering array | |
| constrained locating array | |
| control flow checking | |
| controller failure | |
| convolutional codes | |
| Covert-Channel Attacks | |
| CubeSat | |
| cyber physical systems | |
| Cyber Security | |
| Cyber-Physical | |
| cyber-physical system | |
| cyber-physical systems | |
| D | |
| data error detection | |
| data mining | |
| degradation | |
| Dependability assessment | |
| Detection | |
| dimensionality reduction | |
| discrete event simulator | |
| distributed data protection | |
| distributed systems | |
| DRAM Reliability | |
| Drones | |
| Dynamic analysis | |
| Dynamic IoT systems | |
| E | |
| ECA rules | |
| Efficiency | |
| End-to-end email encryption | |
| enterprise computing | |
| Error correction Code | |
| F | |
| failover | |
| Failure database | |
| fault injection | |
| fault localization | |
| fault recovery | |
| fault tolerance | |
| faults injection | |
| feasibility | |
| formal verification | |
| forward error correction | |
| FPGA | |
| fuzzy logic | |
| G | |
| Game Theory | |
| goodness-of-fit | |
| GPS Spoofing | |
| H | |
| Hash | |
| heterogeneous controllers | |
| high availability | |
| Highly interactive systems | |
| Hybrid Automata | |
| I | |
| Identification service | |
| Incentive mechanism | |
| Indoor Temperature | |
| information leakage model | |
| instruction duplication | |
| Internet of things | |
| Internet-of-Things | |
| intrusion detection | |
| Invariants | |
| IoT | |
| isolation | |
| K | |
| k-anonymity | |
| L | |
| LKAS | |
| M | |
| Machine Learning | |
| majority attack | |
| malicious web scraping | |
| MDS codes | |
| mesh array | |
| metamorphic relation | |
| metamorphic testing | |
| mixed-criticality | |
| mobile applications | |
| mobile device management | |
| Mobile IoT systems | |
| Mobile software | |
| Mobility Models | |
| model checking | |
| MSDND | |
| multiprocessor | |
| N | |
| n-coloring problem | |
| Nanosatellite | |
| Narrowband Internet-of-Things (NB-IoT) | |
| Network Economics | |
| non-homogeneous binomial process | |
| non-homogeneous Poisson process | |
| O | |
| One-way group key agreement | |
| openpilot | |
| P | |
| Parallelization | |
| partial reconfiguration | |
| physically verifiable | |
| Platform market | |
| Poisson-binomial distribution | |
| Policy | |
| prediction | |
| private data release | |
| Problem Detection | |
| product search engine | |
| Proof of Work (PoW) | |
| Protocol expressiveness | |
| PTM model | |
| Q | |
| Queue theory | |
| R | |
| radiation | |
| RAID | |
| real-time | |
| Reed Solomon Code | |
| reliability | |
| reliability estimation | |
| resilience | |
| Resource-constrained | |
| restructuring | |
| reverse engineering | |
| Risk Assessment | |
| rule table distribution | |
| runtime behavior analysis | |
| S | |
| safety | |
| safety analysis | |
| SAT | |
| Satellite | |
| scheduling | |
| SDN | |
| security | |
| Security Assessment | |
| Security Metrics | |
| security policy enforcement | |
| security tools | |
| Security Vulnerabilities | |
| self-driving | |
| Self-driving Cars (SDC) | |
| sensor correlation | |
| Service time | |
| Side-Channel Attacks | |
| silent data corruption | |
| single track switch | |
| sliding window | |
| SmallSat | |
| software | |
| software defined fault tolerance | |
| software diversity | |
| Software fault injection | |
| Software Metrics | |
| software release decision | |
| software reliability | |
| Software Security | |
| software signature | |
| Software testing | |
| software-defined networking | |
| space | |
| spaceflight | |
| static branch prediction | |
| STPA | |
| System-on-chip | |
| T | |
| TCAM | |
| temporal correctness | |
| test-run reliability | |
| Text mining | |
| Thermal Sensation | |
| timed automata | |
| Topic model | |
| transaction | |
| transient error detection | |
| Trustworthiness Benchmarking | |
| U | |
| UAS Traffic Management (UTM) | |
| Unified Modeling Language | |
| Unmanned Aerial Vehicle | |
| Unmanned Aircraft Systems (UAS) | |
| unsupervised learning | |
| W | |
| wireless sensor network | |
| Z | |
| zero-day attacks | |