Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
supply chain security
biblio
Using Scan Side Channel for Detecting IP Theft
Submitted by grigby1 on Wed, 05/17/2017 - 12:34pm
bitcoin security
pubcrawl
Resiliency
supply chain risk assessment
supply chain security
biblio
Hardware Trojans: Lessons Learned After One Decade of Research
Submitted by grigby1 on Wed, 05/17/2017 - 12:34pm
attack model
countermeasures
Hardware security and trust
hardware Trojan attacks
pubcrawl
Resiliency
supply chain security
biblio
Defense Systems and IoT: Security Issues in an Era of Distributed Command and Control
Submitted by grigby1 on Wed, 05/17/2017 - 12:33pm
chips
counterfeit
counterfeit threats
defense systems
electronics
Hardware
hardware vulnerabilities
integrating supply chain and technical data
IoT
pubcrawl
quantifying risk of counterfeits
Resiliency
supply chain for electronic parts
supply chain risk assessment
supply chain security
testing of electronic chips
biblio
FORTIS: A Comprehensive Solution for Establishing Forward Trust for Protecting IPs and ICs
Submitted by grigby1 on Wed, 05/17/2017 - 12:33pm
3PIP
encryption
IC overproduction
IP overuse
pubcrawl
Resiliency
Supply Chain
supply chain security
system-on-chip
biblio
Probabilistic Financial Community Models with Latent Dirichlet Allocation for Financial Supply Chains
Submitted by grigby1 on Wed, 05/17/2017 - 12:33pm
financial supply chain
generative probabilistic model
latent Dirichlet allocation
mortgage backed securities
pubcrawl
Resiliency
supply chain risk assessment
supply chain security
biblio
resMBS: Constructing a Financial Supply Chain from Prospectus
Submitted by grigby1 on Wed, 05/17/2017 - 12:33pm
clustering
community detection
mortgage backed securities (MBS)
named entity recognition
pubcrawl
Resiliency
Rule based text extraction
supply chain risk assessment
supply chain security
SystemT
biblio
Security Engineering Risk Analysis (SERA)
Submitted by grigby1 on Wed, 05/17/2017 - 12:33pm
pubcrawl
Resiliency
security lifecycle
security risk analysis
Security Risk Management
software security engineering
supply chain risk assessment
supply chain risk management
supply chain security
vulnerabilities
biblio
Intrusion Detection System Based on Complex Event Processing in RFID Middleware
Submitted by grigby1 on Tue, 05/16/2017 - 11:34am
collaboration
complex event process
composability
ESPER
IDS
Intrusion Detection
Intrusion Detection System (IDS)
Intrusion Detection Systems
middleware
pubcrawl
Resiliency
RFID
security
supply chain risk assessment
supply chain security
biblio
Securing the supply chain for commodity IT devices by automated scenario generation
Submitted by grigby1 on Wed, 03/08/2017 - 1:28pm
security of data
Hardware
Homeland Security
Microprogramming
nonUS suppliers
operating systems
program analysis
program diagnostics
pubcrawl170112
security
grave vulnerabilities
software components
static program analysis
Supply Chain
supply chain management
supply chain security
supply chains
Theseus
vetting process
component interaction mapping
attack graph generation
attack graph generation algorithms
automated scenario generation
Boolean functions
Boolean satisfiability solver
checklist generation workflow
commodity devices
commodity IT devices
adversary goals
computer architecture
cyber-attacks
DARPA VET program
DP industry
firmware
firmware-software architecture
FW-SW
graph theory
biblio
Protecting endpoint devices in IoT supply chain
Submitted by grigby1 on Wed, 03/08/2017 - 1:26pm
IoT supply chain
uniquely identifiable embedded computing devices
Traceability
supply chains
supply chain security
supply chain management
security issues
security challenges
secure access control
RFID-enabled solution
RFID tag
radiofrequency identification
pubcrawl170112
production engineering computing
privacy challenges
privacy
authentication
IoT device authentication
Internet of Things (IoT)
Internet of Things
Internet infrastructure
internet
Hardware
endpoint device protection
Endpoint Device
data transfer
data privacy
control chip
communication efficiency
centralized database
authorisation
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »