Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
supply chain security
biblio
Hardware Trojan Insertion and Detection in Asynchronous Circuits
Submitted by grigby1 on Wed, 02/26/2020 - 3:38pm
neural network
Trojan horses
trojan horse detection
Trojan detection methods
synchronous hardware Trojan
supply chain security
Routing
Resiliency
resilience
Random Forest
pubcrawl
Pipelines
asynchronous circuit
logic design
Latches
hardware Trojan threats
hardware Trojan insertion
hardware trojan
Hardware
delays
deep learning
cyber physical systems
asynchronous hardware Trojan circuits
asynchronous circuits
biblio
LAOCOÖN: A Run-Time Monitoring and Verification Approach for Hardware Trojan Detection
Submitted by grigby1 on Wed, 02/26/2020 - 3:38pm
LAOCOON
verification rules
Trojan horses
trojan horse detection
temporal properties
supply chain security
sensitive information
security
Safety
run-time verification
run-time monitoring
Resiliency
resilience
pubcrawl
Monitoring
malicious inclusions
active fault attacks
invasive software
Integrated circuit modeling
hardware Trojan horses
hardware Trojan detection
Hardware Security
Hardware
generic attackers
formal verification techniques
formal verification
Fault Attacks
electronic systems
dedicated monitoring circuits
cyber physical systems
Circuit faults
automata
biblio
Hardware Trojans Detection at Register Transfer Level Based on Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 3:37pm
Libraries
Trojan horses
trojan horse detection
training database
Training
supply chain security
source code (software)
shift registers
server-client mechanism
RTL source codes
Resiliency
resilience
register transfer level
pubcrawl
machine-learning-based detection method
circuit features extraction
learning (artificial intelligence)
invasive software
integrated circuits design process
Integrated circuit modeling
integrated circuit design
Hardware Trojans library
Hardware Trojans detection
Hardware
flip-flops
feature extraction
electronic engineering computing
database management systems
cyber physical systems
biblio
Checkpoints Assignment on Cyber-Physical Digital Microfluidic Biochips for Early Detection of Hardware Trojans
Submitted by grigby1 on Wed, 02/26/2020 - 3:37pm
Resiliency
Hardware
hardware trojan
hardware Trojans attacks
invasive software
Lab-on-a-Chip
Microfluidics
piracy attacks
pubcrawl
resilience
frequent diseases detection
security
security concern
security study
Sequential analysis
supply chain security
tools
trojan horse detection
Trojan horses
cyber-physical digital microfluidic biochips
biochip design flow
biochips
biological techniques
bioprotocol manipulation attacks
checkpoint
checkpointing
checkpoints assignment
Computer crime
cyber physical systems
biochemical analysis
cyber-physical systems
denial-of-service attacks
digital microfluidic biochip
diseases
DMF biochip
Electrodes
error detection
error-recovery sensing systems
biblio
CDTA: A Comprehensive Solution for Counterfeit Detection, Traceability, and Authentication in the IoT Supply Chain
Submitted by grigby1 on Mon, 01/27/2020 - 11:35am
policy-based governance
Traceability
supply chain security
supply chain risk assessment
Scalability
Resiliency
resilience
radio-frequency identification (RFID)
pubcrawl
authentication
Metrics
Internet of Things (IoT)
Human Factors
Human behavior
counterfeit detection
composability
collaboration
biblio
Security Requirement Prototyping with Hyperledger Composer for Drug Supply Chain: A Blockchain Application
Submitted by grigby1 on Mon, 01/27/2020 - 11:34am
blockchain
collaboration
Compliance
composability
Human behavior
Human Factors
hyperledger composer
Metrics
policy-based governance
prototyping
pubcrawl
resilience
Resiliency
Scalability
supply chain risk assessment
supply chain security
biblio
Understanding Security Requirements for Industrial Control System Supply Chains
Submitted by grigby1 on Tue, 01/21/2020 - 11:16am
Scalability
organizational aspects
Organizations
pubcrawl
resilience
Resiliency
risk assessment
risk decision-making
risk management
organisational aspects
security industrial control system supply chains
security requirements
Standards organizations
stuxnet attack
supply chain management
supply chain risk assessment
supply chains
supply chain security
nuclear facility
Natanz city
malware
Iran
integrated circuits
Industrial Control Systems Anomaly Detection
Industrial Control Systems
industrial control
human issues
Decision Making
cyber-physical systems
cyber-physical infrastructures
control system security
control engineering computing
Computer crime
biblio
Ubiquitous System to Monitor Transport and Logistics
Submitted by aekwall on Mon, 02/18/2019 - 11:54am
security
Scalability
Resiliency
Human behavior
pubcrawl
Logistics
ubiquitous system
wireless technologies
supply chain security
biblio
Blockchain Technology for Supply Chain Traceability, Transparency and Data Provenance
Submitted by aekwall on Mon, 02/18/2019 - 11:54am
Scalability
Resiliency
Human behavior
pubcrawl
blockchain
ERP
Mining Industries
smart contract
supply chain security
biblio
Regulatory Supervision with Computational Audit in International Supply Chains
Submitted by aekwall on Mon, 02/18/2019 - 11:53am
Scalability
Resiliency
Human behavior
pubcrawl
audit
Compliance
process mining
regulatory supervision
supply chains
supply chain security
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »