Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trojan horse detection
biblio
Detecting Trojan Attacks on Deep Neural Networks
Submitted by grigby1 on Mon, 11/08/2021 - 12:37pm
pubcrawl
Trojan horses
trojan horse detection
trojan
Training
supply chain security
Strips
Resiliency
resilience
composability
Predictive models
Prediction algorithms
neural network
deep learning
Data models
cyber physical systems
cyber physical security
Computational modeling
biblio
Detection of Trojan Based DoS Attacks on RSA Cryptosystem Using Hybrid Supervised Learning Models
Submitted by grigby1 on Mon, 11/08/2021 - 12:36pm
machine learning algorithms
Trojan horses
trojan horse detection
supply chain security
security
RSA
Resiliency
resilience
pubcrawl
Power profile
chipwhisperer
machine learning
Integrated circuit modeling
hardware Trojan horses
Hardware
Data models
cyber physical systems
cyber physical security
Cryptography
composability
biblio
IR-Drop Calibration for Hardware Trojan Detection
Submitted by grigby1 on Mon, 11/08/2021 - 12:36pm
process deviation
Voltage measurement
Trojan horses
trojan horse detection
supply chain security
Semiconductor device measurement
Ring Oscillator
Resiliency
resilience
pubcrawl
composability
Power supplies
IR-drop
Integrated circuit modeling
hardware trojan
Hardware
Frequency measurement
cyber physical systems
cyber physical security
biblio
A Novel Golden-Chip-Free Clustering Technique Using Backscattering Side Channel for Hardware Trojan Detection
Submitted by grigby1 on Mon, 11/08/2021 - 12:36pm
pubcrawl
Trojan horses
trojan horse detection
Trojan detection
supply chain security
Statistics
Sociology
reverse engineering
Resiliency
resilience
backscatter
integrated circuits
hardware trojan
Hardware Security
Hardware
cyber physical systems
cyber physical security
composability
clustering
Backscattering side-channel
biblio
Hardware Trojan Detection Based on SRC
Submitted by grigby1 on Mon, 11/08/2021 - 12:35pm
resilience
Trojan horses
trojan horse detection
Training
supply chain security
sparse representation-based classifier (SRC)
Size measurement
security
Resiliency
composability
pubcrawl
Noise measurement
machine learning
integrated circuits
hardware trojan
Hardware
cyber physical systems
cyber physical security
biblio
Hardware Trojan Detection Method Based on the Frequency Domain Characteristics of Power Consumption
Submitted by grigby1 on Mon, 11/08/2021 - 12:35pm
Hardware
Trojan horses
trojan horse detection
time-domain analysis
supply chain security
resilience
pubcrawl
Power demand
power analysis
Mahalanobis distance
Integrated circuit modeling
hardware trojan
Time Frequency Analysis and Security
frequency-domain analysis
Fourier transform
encryption
cyber physical systems
cyber physical security
composability
AES encryption circuit
Scalability
Predictive Metrics
Resiliency
biblio
Hardware Trojans Detection Based on BP Neural Network
Submitted by grigby1 on Mon, 11/08/2021 - 12:35pm
Power demand
Trojan horses
trojan horse detection
supply chain security
standards
side channel analysis
Resiliency
resilience
pubcrawl
Backpropagation
Neural networks
hardware trojan
Hardware
encryption
cyber physical systems
cyber physical security
composability
BP Neural Network
biblio
Hardware Trojan Detection Using Power Signal Foot Prints in Frequency Domain
Submitted by grigby1 on Mon, 11/08/2021 - 12:34pm
Hardware
Trojan horses
trojan horse detection
time-domain analysis
supply chain security
resilience
pubcrawl
Power demand
Logic gates
Hardware Trojan (HT) detection
Hardware Security
Time Frequency Analysis and Security
frequency-domain analysis
Frequency domain and Power footprints
delays
cyber physical systems
cyber physical security
composability
Scalability
Predictive Metrics
Resiliency
biblio
Trojan Traffic Detection Based on Machine Learning
Submitted by grigby1 on Mon, 11/08/2021 - 12:34pm
pubcrawl
Trojan horses
trojan horse detection
Trojan detection
Training
Traffic analysis
supply chain security
Resiliency
resilience
random forests
Classification algorithms
Network behavior analysis
machine learning algorithms
machine learning
feature extraction
Data models
cyber physical systems
cyber physical security
composability
biblio
ADobf: Obfuscated Detection Method against Analog Trojans on I2C Master-Slave Interface
Submitted by grigby1 on Mon, 11/08/2021 - 12:34pm
obfuscation
Trojan horses
trojan horse detection
Trojan detection
supply chain security
Sensitivity
Resistors
Resiliency
resilience
pubcrawl
Communication channels
Master-slave
I2C
hardware trojan
Hardware
cyber physical systems
cyber physical security
composability
analog Trojan
Clocks
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »