Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Boolean functions
biblio
Structural Learning Techniques for Bayesian Attack Graphs in Cyber Physical Power Systems
Submitted by aekwall on Mon, 01/10/2022 - 11:50am
data structures
Time factors
Time complexity
Structural Learning
Resiliency
real-time systems
pubcrawl
Predictive Metrics
power systems
Control Theory
composability
Boolean functions
Bayesian network
bayesian attack graph
Bayes methods
attack graphs
resilience
biblio
Coded Computing for Boolean Functions
Submitted by aekwall on Tue, 07/27/2021 - 1:11pm
Computing Theory
resilience
Boolean functions
composability
Compositionality
Computational modeling
Computing Theory and Resilience
Distributed databases
encoding
privacy
pubcrawl
Servers
biblio
Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems
Submitted by grigby1 on Thu, 01/28/2021 - 12:12pm
machine learning
Scalability
Root-of-trust
Resiliency
resilience
pubcrawl
Picture archiving and communication systems
physically unclonable functions
Metrics
machine learning-based attacks
machine learning-based adversary model
Adversary Models
logic locking
learning (artificial intelligence)
Human behavior
Hardware
Cryptography
cryptographic scheme
cryptanalysis attacks
Composed Hardware
Boolean functions
Approximation algorithms
biblio
Approximate Probabilistic Security for Networked Multi-Robot Systems
Submitted by grigby1 on Thu, 12/17/2020 - 12:38pm
multipoint optimization
security
Robot sensing systems
robot operating systems
Resiliency
resilience
pubcrawl
probability
Probabilistic logic
policy-based governance
optimisation
optimal subset
online optimization
Observers
networked multirobot systems
networked control systems
approximate probabilistic security
multi-robot systems
MRS
lower bound estimate
left invertiblility
Human Factors
Human behavior
graph theory
exact probability
disjoint path sets
control system security
computational complexity
combinatorial optimization problem
Boolean functions
binary decision diagrams
biblio
Design of Highly Nonlinear Substitution Boxes Based on I-Ching Operators
Submitted by grigby1 on Mon, 10/05/2020 - 1:02pm
intrication operator
turnover operator
substitution box (S-Box)
strict avalanche criterion
S-boxes
pubcrawl
probability
periodicity property
periodicity measure
periodic iterated function (PIF)
nonlinear substitution boxes
mutual operator
mathematical operators
linear approximation probability
linear approximation
ancient Chinese I-Ching philosophy
identity measure
ICO
I-Ching operators (ICOs)
I-Ching operators
I-Ching
encryption
differential approximation probability
Cryptography
compositionality measure
Compositionality
Boolean functions
Boolean function
approximation theory
biblio
Is Robust Design-for-Security Robust Enough? Attack on Locked Circuits with Restricted Scan Chain Access
Submitted by aekwall on Tue, 09/08/2020 - 8:59am
locked circuits
Chained Attacks
working chip
unauthorized scan access
secret key recovery
scan chain
SAT attack
robust DFS technique
robust DFS design
robust design-for-security architecture
restricted scan chain access
logic locking security
logic locking attacks
Scalability
IP piracy
Boolean satisfiability based attack
benchmark circuits
ATPG
Boolean functions
logic circuits
computability
Security analysis
logic locking
pubcrawl
Resiliency
Cryptography
biblio
Model of optimization of arrangement of video surveillance means with regard to ensuring their own security
Submitted by aekwall on Mon, 04/13/2020 - 9:28am
nonlinear Boolean programming
video surveillance system
video surveillance equipment
video surveillance arrangement
video surveillance
security of video surveillance means
security
Safety
safe city
Resiliency
pubcrawl
nonlinear programming
arrangement optimization
National security
Metrics
illegal actions
Human behavior
damage minimization
crime prevention
crime detection
continuous visual monitoring
closed circuit television
Boolean functions
biblio
Research on LED lightweight cryptographic algorithm based on RFID tag of Internet of things
Submitted by aekwall on Mon, 03/23/2020 - 12:33pm
LED lightweight cryptographic algorithm
search problems
RFIDs
RFID tags
RFID tag chip
RFID tag
Resiliency
radiofrequency identification
radio frequency identification tags
pubcrawl
Piccolo cryptographic algorithm
light emitting diodes
LED lightweight cryptography
Algorithm
InvS-box
Internet of Things
Human behavior
FPGA
field programmable gate arrays
DPA protection technology threshold
DPA attack
Differential Power Analysis
Cryptography
Ciphers
Boolean functions
Boolean expression reconstruction
biblio
On the Impossibility of Approximation-Resilient Circuit Locking
Submitted by grigby1 on Thu, 03/12/2020 - 11:02am
IC
signature based defense
security guarantees
Scalability
Resiliency
resilience
relaxed notion
pubcrawl
original circuit
microscopy
malicious foundry
long-standing hardness assumptions
logic locking
learning (artificial intelligence)
Integrated circuit modeling
Integrated Circuit Camouflaging
Adversary Models
Foundries
formally defined notions
formal approach
exponentially approximation-resilient
exact-recovery-resiliency
digital signatures
Cryptography
Computational modeling
cL
Boolean functions
boolean circuits
benchmark circuits
approximation-resilient Circuit locking
approximation-resiliency
algorithmic attacks
biblio
Automated Generation and Selection of Interpretable Features for Enterprise Security
Submitted by grigby1 on Fri, 03/22/2019 - 12:00pm
machine learning method
Training data
security of data
security
Scalability
Resiliency
resilience
pubcrawl
pattern clustering
Metrics
malware
malicious activity detection
big data security
learning (artificial intelligence)
Fourier transforms
fourier analysis
feature extraction
enterprise security logs
DNF formulas
cyber security
Clustering algorithms
classifiers
Boolean functions
1
2
next ›
last »