Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
A Novel Golden-Chip-Free Clustering Technique Using Backscattering Side Channel for Hardware Trojan Detection
Submitted by grigby1 on Mon, 11/08/2021 - 1:36pm
pubcrawl
Trojan horses
trojan horse detection
Trojan detection
supply chain security
Statistics
Sociology
reverse engineering
Resiliency
resilience
backscatter
integrated circuits
hardware trojan
Hardware Security
Hardware
cyber physical systems
cyber physical security
composability
clustering
Backscattering side-channel
biblio
Hardware Trojan Detection Based on SRC
Submitted by grigby1 on Mon, 11/08/2021 - 1:35pm
resilience
Trojan horses
trojan horse detection
Training
supply chain security
sparse representation-based classifier (SRC)
Size measurement
security
Resiliency
composability
pubcrawl
Noise measurement
machine learning
integrated circuits
hardware trojan
Hardware
cyber physical systems
cyber physical security
biblio
Hardware Trojan Detection Method Based on the Frequency Domain Characteristics of Power Consumption
Submitted by grigby1 on Mon, 11/08/2021 - 1:35pm
Hardware
Trojan horses
trojan horse detection
time-domain analysis
supply chain security
resilience
pubcrawl
Power demand
power analysis
Mahalanobis distance
Integrated circuit modeling
hardware trojan
Time Frequency Analysis and Security
frequency-domain analysis
Fourier transform
encryption
cyber physical systems
cyber physical security
composability
AES encryption circuit
Scalability
Predictive Metrics
Resiliency
biblio
Hardware Trojans Detection Based on BP Neural Network
Submitted by grigby1 on Mon, 11/08/2021 - 1:35pm
Power demand
Trojan horses
trojan horse detection
supply chain security
standards
side channel analysis
Resiliency
resilience
pubcrawl
Backpropagation
Neural networks
hardware trojan
Hardware
encryption
cyber physical systems
cyber physical security
composability
BP Neural Network
biblio
Hardware Trojan Detection Using Power Signal Foot Prints in Frequency Domain
Submitted by grigby1 on Mon, 11/08/2021 - 1:34pm
Hardware
Trojan horses
trojan horse detection
time-domain analysis
supply chain security
resilience
pubcrawl
Power demand
Logic gates
Hardware Trojan (HT) detection
Hardware Security
Time Frequency Analysis and Security
frequency-domain analysis
Frequency domain and Power footprints
delays
cyber physical systems
cyber physical security
composability
Scalability
Predictive Metrics
Resiliency
biblio
ADobf: Obfuscated Detection Method against Analog Trojans on I2C Master-Slave Interface
Submitted by grigby1 on Mon, 11/08/2021 - 1:34pm
obfuscation
Trojan horses
trojan horse detection
Trojan detection
supply chain security
Sensitivity
Resistors
Resiliency
resilience
pubcrawl
Communication channels
Master-slave
I2C
hardware trojan
Hardware
cyber physical systems
cyber physical security
composability
analog Trojan
Clocks
biblio
Cyber Resilience and Response
Submitted by willirn1 on Tue, 10/26/2021 - 4:03pm
cyber resilience
Cyber Response
C3E
cyber threat
Cybersecurity
Risk
Supply Chain Attacks
supply chains
malware
NotPetya
Software
distribution
ransomware attacks
Hardware
Vendors
biblio
Industrial Internet of Things (IIoT) Interconnections
Submitted by willirn1 on Tue, 10/26/2021 - 3:40pm
IoT
Industrial Internet of Things (IIoT)
Hardware
Software
firmware
Supply Chain
C3E
Compromise
biblio
Cyber Supply Chain Risk Management
Submitted by willirn1 on Tue, 10/26/2021 - 10:59am
systems security engineering
Executive Order 13636
Cyberspace Policy Review
Cybersecurity Strategy and Implementation Plan
Cybersecurity Enhancement Act
Comprehensive National Cybersecurity Initiative
software & firmware
Hardware
cloud & virtualization
Vulnerability Management
C-SCRM
security programs & operations
security measurement
security controls
risk assessment
malware
information sharing
cyber supply chain risk management
controls assessment
biblio
Research on Secure JTAG Debugging Model Based on Schnorr Identity Authentication Protocol
Submitted by aekwall on Tue, 10/12/2021 - 3:07pm
security
Hardware
system-on-chip
privacy
authentication
Protocols
encryption
pubcrawl
composability
Compositionality
policy-based governance
debugging
protocol verification
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
…
next ›
last »