Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

communication platform

biblio

Visible to the public Analysis of Black Hole Router Attack in Network-on-Chip

Submitted by grigby1 on Mon, 03/23/2020 - 4:15pm
  • Resiliency
  • Multiprocessors System-on-Chip
  • network-on-chip
  • network on chip security
  • NoC
  • outsourcing
  • outsourcing design
  • Packet loss
  • processing cores
  • pubcrawl
  • resilience
  • multiprocessing systems
  • Router Systems Security
  • Scalability
  • security
  • security attacks
  • sensitive information
  • System performance
  • telecommunication network routing
  • Trojan horses
  • very strong violent attack
  • Hardware
  • BHR attack
  • Black Hole Router attack
  • black holes
  • Blak Hole
  • communication platform
  • computer network security
  • data packets
  • denial of service attack
  • Denial-of-Service
  • DoS.
  • BHR
  • hardware trojan
  • HT
  • HT model
  • infected node
  • Integrated circuit modeling
  • invasive software
  • malicious Hardware Trojan
  • malicious nodes
  • Metrics
biblio

Visible to the public Identifying digital threats in a hacker web forum

Submitted by grigby1 on Tue, 03/07/2017 - 1:39pm
  • Discussion forums
  • Social network services
  • sentiment analysis tool
  • sentiment analysis
  • query processing
  • pubcrawl170109
  • parts of speech tagger
  • natural language processing
  • malicious hackers
  • internet
  • HTML
  • Hacking
  • hacker Web forum
  • hacker language analysis
  • discussion posts
  • automated analysis tools
  • digital threat identification
  • Databases
  • data systems
  • data querying
  • Data mining
  • cyber-attacks
  • customized Web-crawler
  • critical infrastructures
  • critical infrastructure
  • critical computer networks
  • Computer hacking
  • Computer crime
  • communication platform

Terms of Use  |  ©2023. CPS-VO