Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
A Tiered Security Analysis of Industrial Control System Devices
Submitted by grigby1 on Wed, 05/09/2018 - 2:49pm
Programmable Logic Controllers (PLCs)
vulnerabilities
tiered security analysis
threats
supervisory control and data acquisition (SCADA) systems
Software
security of data
security countermeasures
security
SCADA systems
Resiliency
resilience
pubcrawl
assets
production engineering computing
numerical control
Industrial Control Systems (ICSs)
Industrial Control system devices
industrial control
Industrial Communication
Human behavior
Hardware
Distributed Control Systems (DCSs)
computer security
computer architecture
Compositionality
biblio
Detection and mitigation of Denial of Service (DoS) attacks using performance aware Software Defined Networking (SDN)
Submitted by K_Hooper on Wed, 05/09/2018 - 10:52am
pubcrawl
telecommunication traffic
Software Defined Networks
software defined networking
sFlow-RT
sFlow
security of data
security
SDN security
SDN
Scalability
Resiliency
computer architecture
Protocols
performance aware Software Defined Networking
OpenFlow
Monitoring
Hardware
DoS attack
Denial of Service attacks
denial of service attack
data centers
control systems
computer network security
biblio
Hardware-Based Anti-Counterfeiting Techniques for Safeguarding Supply Chain Integrity
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
pubcrawl
system designer
supply chain security
supply chains
supply chain management
supply chain integrity
security matrices
Scalability
reverse engineering
Resiliency
resilience
Consumer electronics
product supply chain
IP theft
intellectual property laws
integrated circuits
Human behavior
hardware security-based techniques
hardware-based anti-counterfeiting
Hardware
counterfeiting
counterfeit detection
biblio
A Global Approach for the Improvement of UHF RFID Safety and Security
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
Safety
UHF RFID tags
UHF RFID security improvement
UHF RFID safety improvement
UHF RFID
UHF devices
telecommunication network reliability
system robustness evaluation
system behavior simulation
supply chain security
security
secure tag hardware architectures
secure protocols
Scalability
authentication
Robustness
RFID privacy
Resiliency
resilience
radiofrequency identification
pubcrawl
Protocols
ns2
Human behavior
Hardware
fpga prototyping
Cryptographic Protocols
Authentication Protocols
biblio
Visible but Transparent Hardware Trojans in Clock Generation Circuits
Submitted by grigby1 on Wed, 04/11/2018 - 3:01pm
clock generation circuits
Clocks
composability
cyber physical systems
Frequency conversion
Hardware
Injection-locked oscillators
pubcrawl
resilience
Resiliency
Ring oscillators
transparent Trojans
trojan horse detection
Trojan horses
biblio
Programmable Assertion Checkers for Hardware Trojan Detection
Submitted by grigby1 on Wed, 04/11/2018 - 3:01pm
outsourcing
VLSI chips
Trojan horses
trojan horse detection
system-on-chip
system on chip
SoC
security of data
Resiliency
resilience
pubcrawl
programmable logic fabric
programmable logic arrays
programmable assertion checkers
product development
circuit complexity
Monitoring
manufactured product security
manufactured product authenticity
integrated circuit design
hardware Trojan detection
hardware assertion optimization
Hardware
field programmable gate arrays
design complexity
cyber physical systems
cost reduction
composability
Circuit synthesis
circuit designers
biblio
Analysis of Side-Channel Attack AES Hardware Trojan Benchmarks against Countermeasures
Submitted by grigby1 on Wed, 04/11/2018 - 3:01pm
HT defense
Trojan horses
trojan horse detection
side-channel attacks
side-channel attack AES hardware Trojan benchmarks
Side-channel attack
Resiliency
resilience
pubcrawl
HT detection
HT design
AES benchmark
HT benchmark
hardware trojan
hardware security issue
Hardware Security
Hardware
encryption
cyber physical systems
Cryptography
composability
Benchmark testing
biblio
Trojan-Feature Extraction at Gate-Level Netlists and Its Application to Hardware-Trojan Detection Using Random Forest Classifier
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
Logic gates
TrustHUB benchmarks
Trojan-feature extraction
Trojan nets
Trojan horses
trojan horse detection
Resiliency
resilience
random forest classifier
Random Forest
pubcrawl
normal nets
Multiplexing
malicious third-party vendors
machine-learning based hardware Trojan classifier
machine learning
Benchmark testing
learning (artificial intelligence)
invasive software
integrated circuits
integrated circuit design
IC design process
hardware-Trojan infected nets
hardware-Trojan detection
hardware trojan
Hardware
gate-level netlists
gate-level netlist
feature extraction
F-measure
cyber physical systems
composability
biblio
Combinational Hardware Trojan Detection Using Logic Implications
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
logical implications
valid logic implications
Trojan horses
trojan horse detection
security
Resiliency
resilience
pubcrawl
proof-of-concept demonstration
potential benefit
Payloads
combinational circuits
logic simulation
Logic gates
logic design
invasive software
Integrated circuit modeling
Hardware
cyber physical systems
composability
combinational hardware trojan detection
biblio
Behavior Profiling of Power Distribution Networks for Runtime Hardware Trojan Detection
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
mission critical applications
Trojan horses
trojan horse detection
traditional techniques
Temperature sensors
system-on-chip
simple processing mechanism
runtime hardware Trojan detection techniques
Runtime
Resiliency
resilience
pubcrawl
power distribution networks
Monitoring
behavior profiling
manufacturing test phase
IP based SoC
invasive software
Intrusion Detection
integrated circuits
Hardware
golden data model
digital power profile
cyber physical systems
Cryptography
composability
classical Advanced Encryption Standard circuit
circuit under test
« first
‹ previous
…
48
49
50
51
52
53
54
55
56
…
next ›
last »