Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
product development
biblio
On In-Vehicle Network Security Testing Methodologies in Construction Machinery
Submitted by grigby1 on Fri, 05/12/2023 - 10:12am
Productivity
Wireless communication
Software
security testing
SAE J1939
Resiliency
resilience
pubcrawl
Protocols
Internet of Vehicles
product development
pen testing
Human Factors
Human behavior
fuzzing
controller area network
construction machinery
security
biblio
Sharing Cyber Threat Intelligence and Collaboration
Submitted by grigby1 on Tue, 07/12/2022 - 3:24pm
malware
Zack Information Gap analysis
sharing of cyber threat information
product development
Cyber Threat Information
policy governance
information sharing
cryptology
Compositionality
Metrics
collaboration
composability
Ecosystems
Resiliency
resilience
pubcrawl
Organizations
machine learning
information security
biblio
Design of Generic Verification Procedure for IIC Protocol in UVM
Submitted by grigby1 on Tue, 11/12/2019 - 4:29pm
SDA(Serial data line)
Monitoring
policy-based governance
privacy
product development
program verification
protocol verification
Protocols
pubcrawl
SCL(Serial clock line)
Mentor graphic Questasim 10.4e
standard method
Synchronization
Universal Verification Methodology
UVC(Universal verification component)
UVM
UVM(Univeral verification methodology)
Verilog
Vivado
field buses
APB(Advanced peripheral bus)
bugs
Clocks
code coverage
collaboration
composability
Compositionality
Conferences
DUT(Design under test)
Aerospace electronics
functional coverage
generic verification procedure
hardware description languages
Hardware design languages
IIC bus protocol
IIC controller
IIC protocol
Libraries
biblio
Wiping Techniques and Anti-Forensics Methods
Submitted by aekwall on Wed, 05/08/2019 - 9:42am
metadata
Writing
wiping techniques
wiping standards
tools
standards
software products developement
secure file destruction
Scalability
resilience
pubcrawl
product development
Metrics
anti-forensics methods
meta data
local storage devices
information forensics
Human behavior
forensic analysis
File systems
erasure standards
eraser software
Digital Forensics
data wiping
Cryptography
biblio
Automating Threat Intelligence for SDL
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
open source threat information sources mining
Automated Secure Software Engineering
vulnerability disclosure
threat intelligence
tactical threat intelligence
Stakeholders
security development lifecycle
security community
SDL
product specific threat indicators
product security
product development
Product design
product deployment
security of data
IT infrastructure
Feeds
enterprise information technology infrastructure
software engineering
Data mining
Databases
composability
pubcrawl
Resiliency
security
malware
Conferences
biblio
Programmable Assertion Checkers for Hardware Trojan Detection
Submitted by grigby1 on Wed, 04/11/2018 - 3:01pm
outsourcing
VLSI chips
Trojan horses
trojan horse detection
system-on-chip
system on chip
SoC
security of data
Resiliency
resilience
pubcrawl
programmable logic fabric
programmable logic arrays
programmable assertion checkers
product development
circuit complexity
Monitoring
manufactured product security
manufactured product authenticity
integrated circuit design
hardware Trojan detection
hardware assertion optimization
Hardware
field programmable gate arrays
design complexity
cyber physical systems
cost reduction
composability
Circuit synthesis
circuit designers