Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
finite state machines
biblio
Computation Termination and Malicious Node Detection using Finite State Machine in Mobile Adhoc Networks
Submitted by grigby1 on Mon, 12/28/2020 - 1:03pm
Resiliency
Metrics
mobile ad hoc networks
moving capability
networking domain
participating nodes
pubcrawl
radio range nodes
resilience
MANET
rigid infrastructure
security
telecommunication network topology
telecommunication security
wired line networks
wireless links
wireless medium
wireless technology
finite state machines
active centralized system
ad hoc network
arbitrary basis
attacks
Compositionality
computation termination
execution purpose
finite state machine
MANET Attack Detection
FSM
Handheld computers
high growth rate
highly dynamic topology
hostile free environment
malicious node
malicious node detection
biblio
A Cellular Automata Guided Obfuscation Strategy For Finite-State-Machine Synthesis
Submitted by aekwall on Mon, 11/09/2020 - 1:41pm
reverse engineering
testable key-controlled FSM synthesis scheme
state-transition
reverse engineering attacks
nongroup additive cellular automata
finite-state-machine synthesis
digital system
D1*CAdual
D1*CA
cellular automata guided obfuscation strategy
ip protection
IP piracy
cellular automata
security
flip-flops
Additives
finite state machines
Silicon
automata
industrial property
Logic gates
policy-based governance
composability
pubcrawl
Resiliency
biblio
Mystic: Mystifying IP Cores Using an Always-ON FSM Obfuscation Method
Submitted by aekwall on Mon, 11/09/2020 - 1:32pm
integrated circuit industry
IP piracy
application specific integrated circuits
ASIC technology
circuit complexity
combinational circuits
finite state machine
FSM obfuscation method
hardware obfuscation method
Hardware Security
IP overproduction
ITC99 circuit benchmarks
logic encryption
Logic masking
Mystic obfuscation approach
Mystic protection method
mystifying IP cores
Logic gates
Hardware
Resiliency
pubcrawl
composability
policy-based governance
Production
Complexity theory
microprocessor chips
IP networks
obfuscation
reverse engineering
encoding
finite state machines
logic circuits
logic design
size 45.0 nm
biblio
United We Stand: A Threshold Signature Scheme for Identifying Outliers in PLCs
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
Pulse width modulation
malware
Metrics
OpenPLC software
particular state
Pins
PLCs
predefined states
programmable controllers
Protocols
Prototypes
pubcrawl
malicious disruption
pulse width modulation pins
PWM
Raspberry Pi
Registers
resilience
Resiliency
Scalability
security
signature shares
uncorrupted PLC
group-signature
\$-threshold signature scheme
Anomaly Detection
BIOS Security
compromised state
control engineering computing
corrupted PLC
cyber security awareness week-2017 competition
digital signatures
electro-mechanical processes
finite state machine
finite state machines
(k
Human Factors
I-O Systems
i-o systems security
I/O pin configuration attack
input-output mechanism
IO pin configuration attack
l)-threshold signature scheme
Legacy PLC system
legacy PLCs
malicious code
biblio
Identification of State Registers of FSM Through Full Scan by Data Analytics
Submitted by grigby1 on Fri, 08/28/2020 - 3:55pm
industrial property
state transitions
state register identification
Silicon
Scalability
Resiliency
resilience
regression analysis
Registers
pubcrawl
Physical design
OpenCores
logic design
Intellectual Property Protection
Big Data
FSM state registers
FSM design
finite-state machine
finite state machines
electronic engineering computing
downstream design
Decision trees
Decision Tree
Data protection
Data mining
data analysis
big data security metrics
Big Data Analytics
biblio
A New Pay-Per-Use Scheme for the Protection of FPGA IP
Submitted by grigby1 on Thu, 07/30/2020 - 1:53pm
complex FPGA designs
ip protection
reusable intellectual property design blocks
Physical Unclonable Function
pay-per-use
IP instance
IP infringement
FSM
FPGA IP vendor
FPGA IP protection
finite state machine
Field-Programmable Gate Arrays
Design methodology
copy protection
logic design
application specific integrated circuits
finite state machines
Licenses
composability
PUF
industrial property
field programmable gate arrays
Resiliency
resilience
policy-based governance
pubcrawl
IP networks
security
biblio
Managing Security Policies within Cloud Environments Using Aspect-Oriented State Machines
Submitted by grigby1 on Fri, 04/03/2020 - 12:05pm
pubcrawl
formal verification
high level languages
middleware
middleware service
multitenancy architecture
Openstack cloud environment
Organizations
policy anomalies
Policy Based Governance
finite state machines
safety problems
security
security policies anomalies
security policy management
space complexity
specification languages
Time complexity
verification tools
XACML policies
Cloud Computing
Anomaly Detection
Anomaly Detection and Resolution
AO-FSM
aspect-oriented finite state machines
Aspect-oriented programming
aspect-oriented state machines
authorisation
automata
availability problems
access control policy management
cloud environments
cloud policy verification service
cloud service
collaboration
computer architecture
conflicts
distributed policy management
domain-specific language state machine artifacts
biblio
Supervisor Obfuscation Against Actuator Enablement Attack
Submitted by aekwall on Mon, 01/13/2020 - 12:18pm
actuator attackers
actuator security
supervisor obfuscation
SAT solvers
obfuscated supervisor
normality assumption
finite state machines
finite state automata
computability
closed loop systems
behavior-preserving supervisors
attackability
actuator enablement attack
security of data
Discrete-Event Systems
closed-loop system
actuator attacker
actuator attack
supervisory control
Metrics
composability
pubcrawl
Human behavior
Resiliency
cyber-physical systems
biblio
Vulnerability Detection on Mobile Applications Using State Machine Inference
Submitted by grigby1 on Mon, 01/21/2019 - 12:15pm
Mobile Applications
vulnerability detection
testing methodology
testing
state machine learning
state machine inference
security violations
security of data
security
Resiliency
pubcrawl
program testing
model inference
mobile computing
Android (operating system)
mobile application security
Mobile Application
mobile Android applications
Metrics
machine learning
learning (artificial intelligence)
Inference algorithms
Humanoid robots
Human behavior
finite state machines
Compositionality
Androids
biblio
The undetectable clock cycle sensitive hardware trojan
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
Hardware
Trusted design
Trojan horses
trees (mathematics)
Resiliency
resilience
redundant circuits
pubcrawl
Microelectronic Security
Metrics
invasive software
HT
Hardware Trojans
Circuit faults
FSM
finite state machines
finite state machine
embedded systems
embedded clock-cycle-sensitive hardware trojans
delays
Cryptography chips
Cryptography
critical path
composability
Clocks
clock tree structure
1
2
next ›
last »