Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trojan
biblio
Evil-Twin Browsers: Using Open-Source Code to Clone Browsers for Malicious Purposes
Submitted by grigby1 on Fri, 04/14/2023 - 4:15pm
Browsers
trojan
evil-twin
Browser Security
codes
Resiliency
extension
open-source
Chromium
Compositionality
security
browser
Cloning
Prototypes
cyberattack
Conferences
resilience
Metrics
Human behavior
pubcrawl
biblio
Detecting Trojan Attacks on Deep Neural Networks
Submitted by grigby1 on Mon, 11/08/2021 - 1:37pm
pubcrawl
Trojan horses
trojan horse detection
trojan
Training
supply chain security
Strips
Resiliency
resilience
composability
Predictive models
Prediction algorithms
neural network
deep learning
Data models
cyber physical systems
cyber physical security
Computational modeling
biblio
Mitigation of Tampering Attacks for MR-Based Thermal Sensing in Optical NoCs
Submitted by aekwall on Thu, 09/30/2021 - 11:43am
Resiliency
Very large scale integration
Trojan horses
trojan
Thermal sensors
thermal sensing
tampering attack
security
Scalability
Handheld computers
pubcrawl
Optical sensors
network-on-chip
network on chip security
micro-ring resonator
Metrics
Hardware Security
biblio
A Comprehensive Security System for Digital Microfluidic Biochips
Submitted by grigby1 on Mon, 11/02/2020 - 1:36pm
private key cryptography
intellectual property security
invasive software
IP piracy
Lab-on-a-Chip
malicious attackers
Microfluidics
Pins
policy-based governance
intellectual property piracy
pubcrawl
resilience
Resiliency
secret keys
security
trojan
Trojan attacks
Trojan horses
comprehensive security system
authentication mechanism
bioassay completion time
biochips market
biology computing
bioMEMS
Cameras
CCD cameras
composability
authentication
Computer crime
defense mechanisms
Digital Microfluidic Biochips
Digital Microfluidics
DMFBs
Electrodes
Foundries
industrial property
biblio
Cyber Security at a Glance
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
Sniffing
data records
DDoS and DOS attacks
DDoS Attack
distributed denial-of-service attack
firewall
hacking techniques
man in the middle attack
polymorphic virus
proxy
computer malwares
social engineering
spoofing
Tor browser
trojan
Trojan horses
Trojans
vpn
Worm
BIOS Security
Human Factors
Computer crime
Firewalls (computing)
internet
pubcrawl
Metrics
Resiliency
resilience
cyber security
malware
Scalability
Cyber Attacks
Computer hacking
denial-of-service attack
computer viruses
antivirus
BeEF
boot sector virus
Brute forcing
biblio
A Role for Embedded Instrumentation in Real-Time Hardware Assurance and Online Monitoring against Cybersecurity Threats
Submitted by grigby1 on Wed, 02/26/2020 - 4:44pm
online monitoring
Trojan mitigation
Trojan detection
trojan
threat mitigation
Resiliency
resilience
real-time hardware assurance
pubcrawl
counterfeits
Metrics
invasive software
Human Factors
Human behavior
hardware assurance (HWA)
embedded instrumentation
electronic systems
cybersecurity threats
biblio
Enabling Hardware Trojan Detection and Prevention through Emulation
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
Logic gates
Trojan horses
trojan horse detection
Trojan attack signatures
trojan
tools
Supply Chain
pubcrawl
programmable hardware
Payloads
emulation
invasive software
in-service systems
in-design systems
HWA
hardware Trojan detection
Hardware Assurance
Hardware
FPGA
field programmable gate arrays
biblio
Dynamic Malware Detection Using API Similarity
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
malware
user-confidential information
Trojans
Trojan horses
trojan
tools
Sea measurements
Resiliency
resilience
pubcrawl
pattern matching
malware-detection method
malware samples
Malware Analysis
API
invasive software
information security
Hacker
feature extraction
dynamic Malware detection method
Data mining
credit card details
credit card
Computer crime
Compositionality
application program interfaces
APIs
API similarity
biblio
Security Assessment of Cyberphysical Digital Microfluidic Biochips
Submitted by grigby1 on Wed, 05/17/2017 - 1:27pm
actuator security
composability
cyber physical digital microfludic biochip
denial of service attack
DMFB
DMFB synthesis
dna security
Human behavior
in-vitro
Metrics
pubcrawl
Resiliency
security
tampering
trojan