Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security threats
biblio
FPGA-oriented moving target defense against security threats from malicious FPGA tools
Submitted by aekwall on Mon, 09/09/2019 - 9:48am
FOMTD
Predictive Metrics
Xilinx
target defense
reverse engineering
moving target defense principle
malicious FPGA tools
hardware trojan
FPGA-oriented MTD method
FPGA users
FPGA security
FPGA hardware-software providers
FPGA emulation results
FPGA design suite
FPGA configuration
security of data
defense lines
moving target defense
Benchmark testing
Scalability
Hardware Security
security threats
Trojan horses
pubcrawl
Resiliency
Table lookup
security
Hardware
FPGA
field programmable gate arrays
biblio
Determination of Security Threat Classes on the Basis of Vulnerability Analysis for Automated Countermeasure Selection
Submitted by aekwall on Mon, 08/26/2019 - 9:08am
security threats
Data mining
Vulnerability Analysis
Metrics
policy-based governance
pubcrawl
Human behavior
resilience
security monitoring
open security data sources
data classification
Automated countermeasure selection
security weaknesses
biblio
Machine Learning-Based Recommendation Trust Model for Machine-to-Machine Communication
Submitted by grigby1 on Mon, 06/10/2019 - 12:56pm
resilience
Naive Bayes
pattern classification
Peer-to-peer computing
privacy
pubcrawl
radial support vector machine
Random Forest
receiver operating characteristics
Reliability
Mathematical model
Resiliency
security
security issues
security threats
Supervisory Control and Data Supervisory Acquisition(SCADA)
Support vector machines
telecommunication computing
trust computation measures
Trusted Computing
k nearest neighbor
composability
Computational modeling
computer network security
Decision Tree
Decision trees
internet
Internet of Things(IoTs)
Internet of Vehicles(IoVs)
Internet Protocol
Bayes methods
learning (artificial intelligence)
machine learning
machine learning trust evaluation
Machine learning-based recommendation trust model
Machine Type Communication Devices
Machine-to-Machine communication nodes
machine-to-machine communications
Machine-to-Machine(M2M)
malicious data
biblio
Chronic Poisoning against Machine Learning Based IDSs Using Edge Pattern Detection
Submitted by grigby1 on Wed, 05/01/2019 - 10:33am
learning (artificial intelligence)
Training data
security threats
security of data
security
Scalability
Resiliency
resilience
pubcrawl
Metrics
machine learning algorithms
machine learning
Batch-EPD Boundary Pattern detection algorithm
Intrusion Detection Systems
Intrusion Detection
Image edge detection
edge pattern points
Edge Pattern Detection algorithm
edge detection
detection algorithms
Data models
composability
chronic poisoning attack
big data era
biblio
Securing the Internet of Things and Wireless Sensor Networks via Machine Learning: A Survey
Submitted by aekwall on Mon, 03/25/2019 - 8:56am
physical devices
WSN security
wireless sensor networks
Support vector machines
sensor security
security threats
security of data
security
Resiliency
pubcrawl
Artificial Neural Networks
Neural networks
Metrics
machine learning algorithms
machine learning
learning (artificial intelligence)
IoT security
Internet of Things
Human behavior
composability
biblio
Hardware Trojan Detection Using Path Delay Order Encoding with Process Variation Tolerance
Submitted by grigby1 on Fri, 03/15/2019 - 10:59am
Logic gates
variation-tolerant path delay order encoding technique
Trojan horses
trojan horse detection
security threats
security
pubcrawl
process variation tolerance
path delay information
outsourcing
delays
HT detection techniques
Hardware Trojans
hardware Trojan detection
Hardware
Foundries
fabrication
encoding
DfT
design-for-trust techniques
biblio
A Study on Quantitative Risk Assessment Methods in Security Design for Industrial Control Systems
Submitted by grigby1 on Wed, 03/06/2019 - 3:24pm
risk scoring systems
Metrics
Pervasive Computing Security
production engineering computing
pubcrawl
Quantitative risk assessment
quantitative risk assessment methods
resilience
Resiliency
risk management
Measurement
risk-score dispersion
SCADA(Supervisory Control and Data Acquisition)
security
security design
security of data
security threats
Terms—industrial control systems (ICS)
three-phase risk assessment method
CWSS
automotive-security guideline
Autonomic Security
big data security
composability
control devices
control engineering computing
control systems
CVSS
Automotive engineering
data logger
data loggers
ICS risk assessment
industrial control
Industrial Control Systems
integrated circuits
JASO TP15002
manufacturing systems
biblio
Secure Scan Architecture Using Clock and Data Recovery Technique
Submitted by grigby1 on Thu, 02/14/2019 - 10:22am
fault coverage
Voltage control
System recovery
security threats
security of data
secure scan architecture
Scan Architecture
Resiliency
resilience
pubcrawl
Observability
Hardware Security
fault diagnosis
authentication
encoding
DLL
DfT technique
DfT
design for testability
delays
Controllability
computer architecture
Clocks
clock-data recovery technique
CDR
biblio
Cyber Security of Unmanned Aircraft System Traffic Management (UTM)
Submitted by grigby1 on Thu, 01/31/2019 - 11:12am
pubcrawl
UTM cyber security
urban environments
unmanned aircraft system traffic management
UAS traffic management
sUAS vulnerabilities
Stakeholders
security threats
security of data
Resiliency
resilience
remotely piloted aircraft fly
remotely operated vehicles
Air gaps
paper bridges
Metrics
Human behavior
cyber security
computer security
composability
autonomous aerial vehicles
Aircraft navigation
Aircraft manufacture
aircraft control
Aircraft
air traffic control
biblio
A trust model based on evidence-based subjective logic for securing wireless mesh networks
Submitted by aekwall on Wed, 01/16/2019 - 1:06pm
resilience
WMN
wireless mesh networks
Wireless Mesh Network Security
watchdog detection mechanism
uncertainty
telecommunication security
telecommunication network routing
telecommunication network management
security threats
security
secure route discovery
Bayes methods
recommendation trust information model
pubcrawl
Metrics
Mathematical model
gray-hole attacks
evidence-based subjective logic
Entropy
EBSL
Computational modeling
composability
black-hole attacks
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »