Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Supply Chain
biblio
Cyber Supply Chain Risk 3 Management Practices for Systems 4 5 and Organizations
Submitted by willirn1 on Fri, 10/22/2021 - 4:54pm
C-SCRM
cyber supply chain risk management
acquire
information and communication technology
Supply Chain
cyber supply chain
supply chain assurance
supply chain risk
supply chain risk assessment
supply chain security
risk management
supplier
biblio
Reducing Threats to Key U.S. Supply Chains
Submitted by willirn1 on Fri, 10/22/2021 - 4:41pm
supply chain management
C3E
threats
Supply Chain
Risk
counterintelligence
biblio
National Supply Chain Integrity Month - Call to Action Best Practices
Submitted by willirn1 on Fri, 10/22/2021 - 4:27pm
C3E
Supply Chain
Press Release
Call to Action
DNI
biblio
A Call-to-Action Campaign to Raise Awareness of Supply Chain Threats and Mitigation
Submitted by willirn1 on Fri, 10/22/2021 - 1:16pm
Press Release
Supply Chain
threat mitigation
biblio
Supply Chain Risk Management
Submitted by willirn1 on Fri, 10/22/2021 - 11:34am
advanced cyber threat
Configuration Management
emerging threat
materiel
program protection plan
risk management
Supply Chain
systems engineering process
biblio
Strategic Formation and Reliability of Supply Chain Networks
Submitted by Katie Dey on Thu, 10/21/2021 - 11:46am
uncertainty
Supply Chain
network formation
equilibrium
congestion
biblio
RFID Security, Verification, and Blockchain: Vulnerabilities within the Supply Chain for Food Security
Submitted by Katie Dey on Thu, 10/21/2021 - 11:44am
Supply Chain
agri-food
mobile vulnerability
food security
RFID
blockchain
radio frequency identification
biblio
Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory
Submitted by aekwall on Mon, 03/29/2021 - 11:51am
Repeated game
zero-sum
third-party companies
prospect theory
optimal deception rationality
offshore manufacturing
multilevel game-theoretic framework
manufactured ICs
malicious IC manufacturer
learning stage
IC designers
Hardware Trojans
hardware Trojan detection
first-step deception mitigation process
deception analysis
actual game stage
Scalability
hypergame theory
integrated circuits
game theoretic security
Predictive Metrics
Human Factors
Cybersecurity
supply chains
Supply Chain
pubcrawl
Resiliency
learning (artificial intelligence)
deception
invasive software
game theory
biblio
An Analysis of Pre-installed Android Software
Submitted by grigby1 on Tue, 02/23/2021 - 2:24pm
resilience
potentially harmful behavior
potentially invasive private data collection practices
pre-installed Android software
pre-installed software
preinstalled apps
preinstalled software
privacy implications
product differentiation
pubcrawl
real-world Android firmware
open-source nature
Resiliency
security
sensitive data
smart phones
social network platforms
social networking (online)
Software
Supply Chain
tracking services
unwanted behavior
device manufacturers
Android devices
Android ecosystem
Android OS
Android's open source model
Androids
composability
Computer crime
crowd-sourcing methods
data privacy
data-driven services
Android (operating system)
device vendors
Ecosystems
Humanoid robots
internet
Libraries
Metrics
Microprogramming
mobile computing
mobile network operators
network accountability
biblio
An Orthogonal Algorithm for Key Management in Hardware Obfuscation
Submitted by grigby1 on Mon, 11/02/2020 - 12:28pm
member leakage attack
supply chain management
Supply Chain
semiconductor chips
security
reverse engineering
Resiliency
resilience
pubcrawl
Protocols
policy-based governance
partnership organization
orthogonal obfuscation algorithm
Orthogonal obfuscation
orthogonal matrix
microprocessor chips
authenticate obfuscation keys
Licenses
IP piracy attacks
IP piracy
IP networks
IP cores
intellectual property security
intellectual property piracy attacks
integrated circuits
integrated circuit design
industrial property
Hardware Security
Hardware
copy protection
composability
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »