Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trojan horses
biblio
Construction of Computer Big Data Security Technology Platform Based on Artificial Intelligence
Submitted by grigby1 on Fri, 09/08/2023 - 9:09am
Trojan horses
Platform construction
computer
intelligent data
File systems
Speech recognition
Compositionality
Data Security
network security
security
composability
Big Data
Scalability
Resiliency
resilience
pubcrawl
Artificial Intelligence
biblio
Semi-supervised Trojan Nets Classification Using Anomaly Detection Based on SCOAP Features
Submitted by grigby1 on Fri, 08/18/2023 - 3:11pm
integrated circuits
Testability
gate-level
Resiliency
ICS Anomaly Detection
supervised learning
hardware trojan
Hardware Security
Trojan horses
Logic gates
Scalability
Hardware
resilience
pubcrawl
Anomaly Detection
machine learning
feature extraction
Training
biblio
Sandbox Integrated Gateway for the Discovery of Cybersecurity Vulnerabilities
Submitted by grigby1 on Fri, 02/17/2023 - 4:11pm
Phishing
email server
Email gateway
policy governance
sandbox
sandboxing
malware
Telecommunications
Electronic mail
Logic gates
Trojan horses
composability
pubcrawl
Servers
Organizations
Engines
collaboration
biblio
Runtime Detection of Time-Delay Security Attack in System-an-Chip
Submitted by aekwall on Fri, 02/17/2023 - 9:44am
Trojan horses
Hardware
quality of service
real-time systems
pubcrawl
Resiliency
Power demand
Predictive Metrics
Runtime
System performance
Router Systems Security
Hardware Trojan (HT)
Network-on-Chip (NoC)
System-on-Chip(SoC)
biblio
A Cautionary Note on Protecting Xilinx’ UltraScale(+) Bitstream Encryption and Authentication Engine
Submitted by aekwall on Fri, 01/20/2023 - 3:10pm
security
IP networks
Trojan horses
Hardware
authentication
Scalability
encryption
pubcrawl
Resiliency
Object recognition
signature based defense
biblio
CleaNN: Accelerated Trojan Shield for Embedded Neural Networks
Submitted by grigby1 on Tue, 11/08/2022 - 10:51am
Training
Anomaly Detection
pubcrawl
resilience
Resiliency
Trojan horses
deep learning
Image reconstruction
discrete cosine transforms
Transforms
image restoration
embedded systems
sparse recovery
Trojan Attack
neural network resiliency
biblio
Sensing with Random Encoding for Enhanced Security in Embedded Systems
Submitted by grigby1 on Fri, 09/30/2022 - 2:56pm
Hardware Security
random sensing
random encoding
ios
iOS Security
telemetry
Resiliency
Satellites
hardware trojan
timing
security
Compositionality
Trojan horses
encoding
sensors
resilience
Metrics
Human Factors
pubcrawl
biblio
Phishing Attacks and Protection Against Them
Submitted by grigby1 on Tue, 07/12/2022 - 2:10pm
Phishing
Trojans
malicious PDF-files
bankers
cryptojacking
Ransomware
Writing
social engineering
Electronic mail
pubcrawl
password
resilience
Metrics
Trojan horses
Software
Resiliency
Human behavior
biblio
Hardware Trojan for Lightweight Cryptoraphy Elephant
Submitted by aekwall on Thu, 05/19/2022 - 12:42pm
Cryptography
Trojan horses
Hardware
Human Factors
Conferences
pubcrawl
Scalability
Metrics
Resistance
hardware trojan
Hardware Security
Consumer electronics
Elephant
lightweight cryptography
Tamper resistance
biblio
Deep Learning Based Approach for Hardware Trojan Detection
Submitted by grigby1 on Thu, 05/19/2022 - 12:04pm
deep learning
Neural networks
pubcrawl
resilience
Resiliency
Hardware
Analytical models
composability
Trojan horses
Hardware Trojans
Transistors
Distance measurement
Non-Invasive approach
outlier detection
trojan horse detection
1
2
3
4
5
6
7
8
9
…
next ›
last »