Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

security behavior

biblio

Visible to the public Property Based Formal Security Verification for Hardware Trojan Detection

Submitted by grigby1 on Mon, 11/02/2020 - 1:35pm
  • Resiliency
  • invasive software
  • Logic gates
  • malicious Hardware Trojans
  • modern computer hardware
  • policy-based governance
  • pubcrawl
  • register transfer level information flow security models
  • resilience
  • intellectual property security
  • secret information
  • security
  • security behavior
  • Security Properties
  • Semantics
  • Theorem Proving
  • third-party intellectual property cores
  • Trojan horses
  • golden reference design
  • composability
  • Coq
  • fine grained gate level information flow model
  • formal representations
  • formal security verification
  • Formal Specification
  • formal verification
  • formal verification method
  • Complexity theory
  • Hardware
  • hardware designs
  • Hardware Security
  • hardware trojan
  • industrial property
  • information flow analysis
  • Integrated circuit modeling
file

Visible to the public Bhagavatula_How_do_People_Cranor.pdf

Submitted by Jamie Presken on Mon, 07/13/2020 - 1:42pm
  • data breaches
  • passwords
  • security behavior
biblio

Visible to the public (How) Do people change their passwords after a breach?

Submitted by Jamie Presken on Mon, 07/13/2020 - 1:42pm
  • data breaches
  • passwords
  • security behavior
  • CMU
  • 2020: July
biblio

Visible to the public Behavior Ever Follows Intention?: A Validation of the Security Behavior Intentions Scale (SeBIS)

Submitted by grigby1 on Mon, 04/24/2017 - 11:45am
  • Human behavior
  • Measurement
  • peer to peer security
  • Phishing
  • phishing attack
  • pubcrawl
  • security behavior
  • user studies

Terms of Use  |  ©2023. CPS-VO