Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attack targets
biblio
Data Injection Attack Against Electronic Devices With Locally Weakened Immunity Using a Hardware Trojan
Submitted by grigby1 on Fri, 09/18/2020 - 2:07pm
information and communication devices
electromagnetic changes
electromagnetic interference
Electromagnetic scattering
electromagnetic waves
electronic devices
hardware trojan
high-power electromagnetic environments
IEMI
Immunity testing
electrical signal
integrated circuit reliability
intentional electromagnetic interference
local immunity
locally weakened immunity
low-tolerance IC
low-tolerance integrated circuits
serial communication systems
command injection attacks
Metrics
pubcrawl
resilience
Resiliency
Hardware
telecommunication security
integrated circuits
composability
telecommunication channels
security of data
Electromagnetics
Fault injection
attack targets
communication channel
Communication channels
data injection attack
device availability reduction
device immunity
biblio
An Attack Intention Recognition Method Based on Evaluation Index System of Electric Power Information System
Submitted by grigby1 on Mon, 04/02/2018 - 12:53pm
pubcrawl
node attack
parallel computing
Ports (Computers)
power engineering computing
power information network system
Power system protection
power system security
pre-order attack path
probability
protection requirements
Protocols
network intrusion detection system
resilience
Resiliency
security
security evaluation index system
security of data
security protection configuration
telecommunication security
tools
vulnerability exploit
vulnerability information
attacker ability
attack confidence
attack evidence
attack graph
attack graphs
attack intent
attack intention recognition method
attack probability value
attack proficiency
attack sub-graphs
attack targets
actual power system network security operation
attacker knowledge
attacker willingness
composability
current security technologies
diverse network protocols
electric power information system
graph theory
Indexes
Metrics
network attack graph