Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Boolean functions
biblio
Supporting security protocols on CAN-based networks
Submitted by el_wehby on Mon, 05/14/2018 - 2:27pm
Cryptographic Protocols
standards
shared key generation protocol
security protocols
security
Protocols
physical bus segregation
Payloads
Observers
network security
Electronic mail
arbitrary binary Boolean functions
controller area networks
Controller area network (CAN)
controller area network
computer network security
CAN-based networks
CAN-based automotive systems
CAN XR
CAN protocol security-oriented enhancements
CAN data-link layer
Boolean functions
1646317
biblio
Detection and Masking of Trojan Circuits in Sequential Logic
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
Resiliency
Trojan horses
trojan horse detection
Trojan circuit masking
Trojan circuit detection
TC switch description
TC switch
sub-circuit overhead masking
STG description
state variables
state transition graph description
state estimation
sequential circuits
sequential circuit nodes
ROBDDs
binary decision diagrams
resilience
reduced ordered binary decision diagrams
pubcrawl
precise random estimations
Observability
Logic gates
internal node observability
internal node controllability
graph theory
estimation
cyber physical systems
Controllability
composability
Boolean functions
biblio
Securing the supply chain for commodity IT devices by automated scenario generation
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
security of data
Hardware
Homeland Security
Microprogramming
nonUS suppliers
operating systems
program analysis
program diagnostics
pubcrawl170112
security
grave vulnerabilities
software components
static program analysis
Supply Chain
supply chain management
supply chain security
supply chains
Theseus
vetting process
component interaction mapping
attack graph generation
attack graph generation algorithms
automated scenario generation
Boolean functions
Boolean satisfiability solver
checklist generation workflow
commodity devices
commodity IT devices
adversary goals
computer architecture
cyber-attacks
DARPA VET program
DP industry
firmware
firmware-software architecture
FW-SW
graph theory
biblio
RRE: A Game-Theoretic Intrusion Response and Recovery Engine
Submitted by BrandonB on Tue, 05/05/2015 - 9:13am
RRE
Markov processes
network level game-theoretic response selection engine
network security property
network-level multiobjective response selection
network-level security metric values
networked computing systems
nonlinear inference
optimal network-level response actions
partially observable competitive Markov decision process
lower level attack consequences
security
Snort alerts
stochastic games
Subspace constraints
system-level security events
trees (mathematics)
two-player Stackelberg stochastic game
uncertainty
fuzzy logic theory
attack-response trees
automated response techniques
Boolean functions
Boolean logic
computer network security
Computers
decision theory
detection algorithms
Engines
ART
fuzzy rule set
fuzzy set theory
fuzzy system
game-theoretic intrusion response and recovery engine strategy
game-theoretic optimization process
Games
Intrusion Detection
Intrusion response systems
biblio
Constructing Boolean functions with potentially optimal algebraic immunity based on additive decompositions of finite fields (extended abstract)
Submitted by BrandonB on Fri, 05/01/2015 - 8:40am
Electronic mail
unbalanced functions
Transforms
optimal algebraic degree
information theory
generalized Tu-Deng functions
finite field
fast algebraic attacks
FAA
additive decomposition
Cryptography
cryptographic significant Boolean functions
combinatorial mathematics
combinatorial conjecture
Boolean functions
binary strings
algebraic immunity
Additives
biblio
Constructing Boolean functions with potentially optimal algebraic immunity based on additive decompositions of finite fields (extended abstract)
Submitted by BrandonB on Thu, 04/30/2015 - 12:49pm
Electronic mail
unbalanced functions
Transforms
optimal algebraic degree
information theory
generalized Tu-Deng functions
finite field
fast algebraic attacks
FAA
additive decomposition
Cryptography
cryptographic significant Boolean functions
combinatorial mathematics
combinatorial conjecture
Boolean functions
binary strings
algebraic immunity
Additives
« first
‹ previous
1
2