Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
supply chain security
biblio
Traceability of Counterfeit Medicine Supply Chain through Blockchain
Submitted by grigby1 on Thu, 03/12/2020 - 12:09pm
pharmaceutical industry
Traceability
supply chains
supply chain security
supply chain management
Scalability
Safety
Resiliency
resilience
quick response code security
QR codes
Public key
pubcrawl
production engineering computing
active pharmaceutical ingredients
Organizations
medical supply chain
Human behavior
end-consumer patient harm
encrypted QR code security
drugs
drug safety
Distributed databases
Cryptography
counterfeit-drug
counterfeit medicine supply chain
counterfeit goods
blockchain
biblio
Security and Trust Issues on Digital Supply Chain
Submitted by grigby1 on Thu, 03/12/2020 - 12:08pm
pubcrawl
Trusted Computing
trust problems
trust issues
Traceability
System performance
supply chains
supply chain security
supply chain management
security of data
security management
security
Scalability
Resiliency
resilience
Reliability
advanced information technologies
Pervasive Computing Security
Internet of Things
information technology
information science
Human behavior
History
exploratory investigation
digital supply chain system
digital supply chain management system
digital supply chain
composability
Cloud Computing
blockchain
Automated Response Actions
biblio
Data Management in Supply Chain Using Blockchain: Challenges and a Case Study
Submitted by grigby1 on Thu, 03/12/2020 - 12:08pm
information retrieval
supply chains
supply chain security
supply chain management
Stakeholders
social benefits
Scalability
Resiliency
resilience
pubcrawl
production engineering computing
product tracing
Logistics
Access Control
Industries
Human behavior
financial management
financial benefits
environmental benefits
Distributed databases
data retrieval
data management
cryptocurrencies
blockchain-based SCM systems
blockchain-based food traceability system
blockchain
biblio
A Framework for Integrating Big Data Security Into Agricultural Supply Chain
Submitted by grigby1 on Thu, 03/12/2020 - 12:08pm
Scalability
perishable products
Productivity
pubcrawl
Real time control
real-time systems
reliability system
resilience
Resiliency
Monitoring
security
security of data
supply chain management
supply chain security
supply chains
sustainability requirements
waste reduction
advanced monitoring systems
Internet of Things
Human behavior
food waste reduction
food waste
food supply chain system
food safety
food production
food processing industry
Data integration
big data security
Big Data
Agriculture
Agricultural supply chains
agricultural supply chain management system
agricultural products
biblio
LED Alert: Supply Chain Threats for Stealthy Data Exfiltration in Industrial Control Systems
Submitted by grigby1 on Wed, 02/26/2020 - 4:41pm
programmable logic controller
Kernel
LED alert
light emitting diodes
Measurement
Metrics
operation technology
persistent threats
privacy
programmable controllers
invasive software
pubcrawl
real-time operation
Smart Systems
supply chain attack
supply chain security
supply chain threats
supply chains
threat vectors
Trojan horses
embedded systems
attack vector
computer security
Air gaps
CPU performance
cyber domain
Data Exfiltration
device tree
direct memory access
DMA transfer speed
anomaly detection techniques
Embedded Systems Security
firmware
firmware modification
firmware trojan
Hardware
industrial control
Industrial Control Systems
industrial domain
industrial Internet-of-Things
biblio
Time-Related Hardware Trojan Attacks on Processor Cores
Submitted by grigby1 on Wed, 02/26/2020 - 4:39pm
real-time clock
Trojan horses
trojan horse detection
trigger conditions
time-related Hardware Trojan attacks
time information
system power-on
supply chain security
specific time period passes
specific realworld time
RISC-V processor
Resiliency
resilience
relative-time based Trojan
real-time systems
real-time clock circuits
Clocks
Random access memory
pubcrawl
Payloads
modern electronic systems
microprocessor chips
Kernel
invasive software
internal information
Hardware Trojan designs
hardware trojan
Hardware
extra power consumption
design security
cyber physical systems
biblio
When Capacitors Attack: Formal Method Driven Design and Detection of Charge-Domain Trojans
Submitted by grigby1 on Wed, 02/26/2020 - 4:39pm
information leakage paths
Trojan horses
trojan horse detection
trojan detection approaches
testing
supply chain security
Resiliency
resilience
pubcrawl
invasive software
integrated circuits
Integrated circuit modeling
integrated circuit industry
analog attacks
information flow tracking based solution
IC supply chain
Hardware
formal method driven design
Digital circuits
cyber physical systems
circuit-level properties
charge-domain trojans/vulnerabilities
charge-domain models
charge-domain leakage paths
Capacitors
capacitor-enabled attacks
biblio
Golden Gates: A New Hybrid Approach for Rapid Hardware Trojan Detection Using Testing and Imaging
Submitted by grigby1 on Wed, 02/26/2020 - 4:38pm
Resiliency
Logic Test
low accuracy
malicious modifications
microscopy
modern military systems
new hybrid approach
pubcrawl
rapid hardware trojan detection
resilience
Logic gates
reverse engineering
scanning electron microscopy
security
SEM images
superlative accuracy
supply chain security
trojan horse detection
Trojan horses
grave threat
commercial systems
cyber physical systems
detection method
exhaustive test infrastructure
existing gate footprints
Foundries
GGC
golden chip
golden gate circuits
backside ultra thinning
Hardware
Hardware Trojans
high classification accuracy
high time cost
Image analysis
Imaging
integrated circuits
invasive software
biblio
Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection
Submitted by grigby1 on Wed, 02/26/2020 - 4:38pm
pubcrawl
logic locking method
malicious circuits
million-gate circuits
outsourcing
PCA-based HT detection methods
power analysis-based Trojan detection
power consumption
power consumption analysis
Power demand
principal component analysis
Process Variations
logic locking
resilience
security
semiconductor companies
small sub-circuit collection
supply chain security
Switches
system-on-chip
trojan horse detection
Trojan horses
untrustworthy fabs
hardware Trojan detection
policy-based governance
composability
IP piracy
circuit block extraction
circuit power
cyber physical systems
design for hardware trust
fabrication foundries
gate level
Hardware
Hardware Security
Resiliency
hardware Trojan threat
HT activity
HT power
HT-infected circuits
industrial property
integrated circuit layout
intellectual properties
invasive software
IPS
Logic gates
biblio
Ensemble-Learning-Based Hardware Trojans Detection Method by Detecting the Trigger Nets
Submitted by grigby1 on Wed, 02/26/2020 - 4:38pm
resilience
Trojan types
Trojan horses
trojan horse detection
Trojan circuits
Trigger-net features
Training data
Training
suspicious Trigger nets
supply chain security
security
Resiliency
cyber physical systems
pubcrawl
learning (artificial intelligence)
Integrated circuit modeling
integrated circuit design
IC systems
IC design phase
hardware-Trojan detection method
Hardware
feature extraction
ensemble learning method
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »