Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
supply chain security
biblio
Mitigating Synchronized Hardware Trojan Attacks in Smart Grids
Submitted by grigby1 on Tue, 05/01/2018 - 11:36am
hardware trojan
Human behavior
pubcrawl
resilience
Resiliency
Scalability
Smart Grid
supply chain management
supply chain security
Synchronization
biblio
SoK: RFID-Based Clone Detection Mechanisms for Supply Chains
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
clone detection
Human behavior
pubcrawl
resilience
Resiliency
rfid based supply chain
RFIDs
Scalability
supply chain security
survey
biblio
Hardware-Based Anti-Counterfeiting Techniques for Safeguarding Supply Chain Integrity
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
pubcrawl
system designer
supply chain security
supply chains
supply chain management
supply chain integrity
security matrices
Scalability
reverse engineering
Resiliency
resilience
Consumer electronics
product supply chain
IP theft
intellectual property laws
integrated circuits
Human behavior
hardware security-based techniques
hardware-based anti-counterfeiting
Hardware
counterfeiting
counterfeit detection
biblio
Assessing Software Supply Chain Risk Using Public Data
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
software supply chain risk assessment
Robustness
safety-critical software
Scalability
secure networking library
security
security of data
sigmoid cumulative vulnerability discovery function
Software
risk management
software vulnerability discovery
supply chain management
supply chain risk
supply chain security
supply chains
temporary plateau feature
tools
vulnerability discovery
open source project
AML
commercial government organizations
cumulative vulnerability discovery plot
cybersecurity risk
Databases
Human behavior
national vulnerability database
NVD
Alhazmi-Malaiya Logistic model
open version control data
OpenSSL
Predictive models
pubcrawl
public data
resilience
Resiliency
biblio
Authentication and Traceability of Food Products through the Supply Chain Using NQR Spectroscopy
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
authentication
Capacitors
Chemicals
Food products
Human behavior
pubcrawl
resilience
Resiliency
Scalability
Spectroscopy
supply chain security
supply chains
Support vector machines
biblio
A Global Approach for the Improvement of UHF RFID Safety and Security
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
Safety
UHF RFID tags
UHF RFID security improvement
UHF RFID safety improvement
UHF RFID
UHF devices
telecommunication network reliability
system robustness evaluation
system behavior simulation
supply chain security
security
secure tag hardware architectures
secure protocols
Scalability
authentication
Robustness
RFID privacy
Resiliency
resilience
radiofrequency identification
pubcrawl
Protocols
ns2
Human behavior
Hardware
fpga prototyping
Cryptographic Protocols
Authentication Protocols
biblio
Secure-EPCIS: Addressing Security Issues in EPCIS for IoT Applications
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
production engineering computing
Time factors
supply chain security
supply chain management
Servers
security of data
security issues
Secure-EPCIS
SCM
Scalability
RFID
Resiliency
resilience
radiofrequency identification
pubcrawl
Access Control
Product codes
Permission
Mobile communication
IoT
Internet of Things
Human behavior
EPCIS
EPCglobal standards
EPCglobal Network
electronic products
Electronic Product Code Information System
Data Security
access-control
biblio
Introducing TFUE: The Trusted Foundry and Untrusted Employee Model in IC Supply Chain Security
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
pubcrawl
VLSI
trusted foundry and untrusted employee model
Trojan horses
supply chain security
security
Scalability
Resiliency
resilience
double patterning lithography
mask development lines
lithography
Layout
Integrated circuit modeling
IC supply chain security
Human behavior
Foundries
fabrication
biblio
Authentication of Medicines Using Nuclear Quadrupole Resonance Spectroscopy
Submitted by grigby1 on Wed, 05/17/2017 - 1:34pm
counterfeit medicines
medicines authentication
nitrogen
NQR
pubcrawl
Resiliency
supply chain security
biblio
Making Invisible Things Visible: Tracking Down Known Vulnerabilities at 3000 Companies (Showcase)
Submitted by grigby1 on Wed, 05/17/2017 - 1:34pm
Continuous Integration
DevOps
Nexus Firewall
Nexus Repository OSS
Open Source Software
OSS Repository Hosting
OSSRH
pubcrawl
Resiliency
Software Component Lifecycle Management
Software Variability Management
Sonatype
supply chain risk assessment
supply chain security
The Central Repository
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »