TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
A | |
abnormal node detection | |
ACC | |
acceptable result | |
Access Control | |
Adaptive Repetition | |
algorithms | |
Android malware family signature generation | |
Android security | |
Anomalies | |
anomaly detection | |
approximate adders | |
ArduPilot Flight Controller | |
Arrival rate | |
atomicity | |
attacker model | |
Authorization | |
autonomous vehicle | |
Autonomous Vehicles | |
B | |
Bag of words | |
binary analysis | |
binary equivalence | |
binary rejuvenation | |
bit-flips | |
Bitcoin | |
blockchain | |
botnet detection | |
C | |
Certificateless PKC | |
Chipkill | |
Cloud computing service | |
Cloud security | |
coarse grain lockstep | |
combinatorial interaction testing | |
Conformance Testing | |
constrained covering array | |
constrained locating array | |
control flow checking | |
controller failure | |
convolutional codes | |
Covert-Channel Attacks | |
CubeSat | |
cyber physical systems | |
Cyber Security | |
Cyber-Physical | |
cyber-physical system | |
cyber-physical systems | |
D | |
data error detection | |
data mining | |
degradation | |
Dependability assessment | |
Detection | |
dimensionality reduction | |
discrete event simulator | |
distributed data protection | |
distributed systems | |
DRAM Reliability | |
Drones | |
Dynamic analysis | |
Dynamic IoT systems | |
E | |
ECA rules | |
Efficiency | |
End-to-end email encryption | |
enterprise computing | |
Error correction Code | |
F | |
failover | |
Failure database | |
fault injection | |
fault localization | |
fault recovery | |
fault tolerance | |
faults injection | |
feasibility | |
formal verification | |
forward error correction | |
FPGA | |
fuzzy logic | |
G | |
Game Theory | |
goodness-of-fit | |
GPS Spoofing | |
H | |
Hash | |
heterogeneous controllers | |
high availability | |
Highly interactive systems | |
Hybrid Automata | |
I | |
Identification service | |
Incentive mechanism | |
Indoor Temperature | |
information leakage model | |
instruction duplication | |
Internet of things | |
Internet-of-Things | |
intrusion detection | |
Invariants | |
IoT | |
isolation | |
K | |
k-anonymity | |
L | |
LKAS | |
M | |
Machine Learning | |
majority attack | |
malicious web scraping | |
MDS codes | |
mesh array | |
metamorphic relation | |
metamorphic testing | |
mixed-criticality | |
mobile applications | |
mobile device management | |
Mobile IoT systems | |
Mobile software | |
Mobility Models | |
model checking | |
MSDND | |
multiprocessor | |
N | |
n-coloring problem | |
Nanosatellite | |
Narrowband Internet-of-Things (NB-IoT) | |
Network Economics | |
non-homogeneous binomial process | |
non-homogeneous Poisson process | |
O | |
One-way group key agreement | |
openpilot | |
P | |
Parallelization | |
partial reconfiguration | |
physically verifiable | |
Platform market | |
Poisson-binomial distribution | |
Policy | |
prediction | |
private data release | |
Problem Detection | |
product search engine | |
Proof of Work (PoW) | |
Protocol expressiveness | |
PTM model | |
Q | |
Queue theory | |
R | |
radiation | |
RAID | |
real-time | |
Reed Solomon Code | |
reliability | |
reliability estimation | |
resilience | |
Resource-constrained | |
restructuring | |
reverse engineering | |
Risk Assessment | |
rule table distribution | |
runtime behavior analysis | |
S | |
safety | |
safety analysis | |
SAT | |
Satellite | |
scheduling | |
SDN | |
security | |
Security Assessment | |
Security Metrics | |
security policy enforcement | |
security tools | |
Security Vulnerabilities | |
self-driving | |
Self-driving Cars (SDC) | |
sensor correlation | |
Service time | |
Side-Channel Attacks | |
silent data corruption | |
single track switch | |
sliding window | |
SmallSat | |
software | |
software defined fault tolerance | |
software diversity | |
Software fault injection | |
Software Metrics | |
software release decision | |
software reliability | |
Software Security | |
software signature | |
Software testing | |
software-defined networking | |
space | |
spaceflight | |
static branch prediction | |
STPA | |
System-on-chip | |
T | |
TCAM | |
temporal correctness | |
test-run reliability | |
Text mining | |
Thermal Sensation | |
timed automata | |
Topic model | |
transaction | |
transient error detection | |
Trustworthiness Benchmarking | |
U | |
UAS Traffic Management (UTM) | |
Unified Modeling Language | |
Unmanned Aerial Vehicle | |
Unmanned Aircraft Systems (UAS) | |
unsupervised learning | |
W | |
wireless sensor network | |
Z | |
zero-day attacks |