Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trojan horses
biblio
Malicious code detection model based on behavior association
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
automation
behavior association
behavior monitor
Computers
Grammar
malicious code
Monitoring
pushdown automation
Trojan horses
Virtual machining
biblio
Cross-layer security framework for smart grid: Physical security layer
Submitted by BrandonB on Tue, 05/05/2015 - 10:13am
physical layer security
Trojan horses
smart power grids
smart power grid cyber technology
Smart Grids
smart grid security
Smart Grid
process control system
Process Control Security
process control
predictive control
power system security
physical security layer
conceptual layering model
PCS
Monitoring
isolated security tool
Hidden Markov models
hardware Trojan threat
Hardware
CyNetPhy PSL resolution
cross-layer security framework
Cross-Layer Security
cooperative real-time security system
control systems
biblio
Malicious code detection model based on behavior association
Submitted by BrandonB on Thu, 04/30/2015 - 2:28pm
automation
behavior association
behavior monitor
Computers
Grammar
malicious code
Monitoring
pushdown automation
Trojan horses
Virtual machining
biblio
Design, implementation and security analysis of Hardware Trojan Threats in FPGA
Submitted by BrandonB on Thu, 04/30/2015 - 1:41pm
integrated circuits
RoT
security
denial of service
design
encryption
field programmable gate arrays
FPGA testbed
Hardware
hardware Trojan detection technique
hardware Trojan threats
Hardware Trojans
HDM
HTT detectability metric
HTT detection
ICs
timing variation
integrated logic circuits
invasive software
missed detection probability
normalized physical parameters
optimal detection threshold
power consumption
Power demand
Resiliency
root of trust
Security analysis
sensitive information leak
summation of false alarm
timing
Trojan taxonomy
Trojan horses
« first
‹ previous
…
6
7
8
9
10
11
12
13
14