Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Benchmark testing
biblio
An Application Agnostic Defense Against the Dark Arts of Cryptojacking
Submitted by grigby1 on Tue, 07/12/2022 - 2:59pm
security
pubcrawl
Human behavior
Resiliency
Benchmark testing
microarchitecture
malware
Fingerprint recognition
Metrics
resilience
Cryptographic Hash Function
Robustness
Technological innovation
cryptojacking
cryptocurrency mining
biblio
Internet of Things Attack Group Identification Model Combined with Spectral Clustering
Submitted by grigby1 on Thu, 06/09/2022 - 2:50pm
Human Factors
spectral clustering
attacker portrait
attack group
aggressive behavior
Resiliency
Image analysis
honey pots
Honey pot (computing)
Intrusion Detection
IoT security
Clustering algorithms
Benchmark testing
Data models
Scalability
Conferences
resilience
pubcrawl
biblio
Anomaly Detection for Scenario-based Insider Activities using CGAN Augmented Data
Submitted by grigby1 on Tue, 06/07/2022 - 11:07am
composability
data augmentation
generative adversarial networks
generative adversarial network
visualization
Adversarial training
Measurement
Metrics
Benchmark testing
insider threat
privacy
policy-based governance
Human behavior
pubcrawl
Anomaly Detection
security
Organizations
biblio
ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis
Submitted by aekwall on Thu, 05/19/2022 - 1:36pm
Benchmark testing
privacy
tools
Heuristic algorithms
pubcrawl
Metrics
composability
static analysis
Sensitivity
Context Sensitivity
Dynamic Supplement
Software systems
taint analysis
biblio
A Stealthy Hardware Trojan Design and Corresponding Detection Method
Submitted by grigby1 on Thu, 05/19/2022 - 1:03pm
Hardware Security
trojan horse detection
imbalanced controllability
Observability
unsupervised clustering
Controllability
transition probability
Systematics
Hardware Trojans
pubcrawl
Trojan horses
Benchmark testing
composability
Integrated circuit modeling
Hardware
Resiliency
resilience
biblio
Formal Verification Approach to Detect Always-On Denial of Service Trojans in Pipelined Circuits
Submitted by grigby1 on Thu, 05/19/2022 - 1:03pm
Logic gates
pubcrawl
resilience
Resiliency
Integrated circuit modeling
system-on-chip
composability
Benchmark testing
Trojan horses
formal verification
Hardware Trojans
Scalability
denial of service
Microprocessors
Always-On
trojan horse detection
biblio
Genetic Algorithm based Hardware Trojan Detection
Submitted by grigby1 on Thu, 05/19/2022 - 1:02pm
transition probability
trojan horse detection
Trigger coverage
Test pattern generators
SCOAP
Logical Testing
ISCAS ’85 and 89
and Trojan coverage
masking
Communication Systems
genetic algorithm
pubcrawl
genetic algorithms
Trojan horses
hardware trojan
Benchmark testing
composability
integrated circuits
Hardware
Resiliency
resilience
biblio
Hardware Trojan Detection using Ring Oscillator
Submitted by grigby1 on Thu, 05/19/2022 - 12:59pm
pubcrawl
resilience
Resiliency
Hardware
Integrated circuit modeling
composability
Benchmark testing
Transient analysis
Trojan horses
Hardware Trojans
Ring oscillators
Ring Oscillator
Transient Effect Ring Oscillator
Trojan detection
Xilinx Vivado
trojan horse detection
biblio
Hardware-Trojan Classification based on the Structure of Trigger Circuits Utilizing Random Forests
Submitted by grigby1 on Thu, 05/19/2022 - 12:59pm
composability
trojan horse detection
netlist
hardware trojan
manufacturing
Hardware Security
Random Forest
Trojan horses
Benchmark testing
Internet of Things
integrated circuits
Hardware
Resiliency
resilience
pubcrawl
machine learning
feature extraction
biblio
Identification of Cyber Threats and Parsing of Data
Submitted by grigby1 on Thu, 05/19/2022 - 12:55pm
Organizations
Support vector machines
pubcrawl
Radio frequency
Correlation
privacy
Benchmark testing
Metrics
Market research
Technological innovation
threat vectors
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »