Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
critical components
biblio
Criticality Analysis Process Model: Prioritizing Systems and Components
Submitted by willirn1 on Tue, 10/26/2021 - 10:42am
Baseline criticality
criticality
criticality analysis
critical components
critical programs
critical systems
information security
prioritizing components
prioritizing programs
prioritizing systems
prioritization
privacy
biblio
Behavioral Based Trust Metrics and the Smart Grid
Submitted by grigby1 on Fri, 03/22/2019 - 1:00pm
Smart Grid
pubcrawl
resilience
Resiliency
Routing
Scalability
security
security of data
service level strategies
power system security
smart power grids
statistical analysis
substation protection
Substations
telecommunication network routing
trust levels
trust measurements
Trusted Communications
learning (artificial intelligence)
behavioral pattern analysis
big data security
communication routing
critical components
electrical grid
Entropy
Grid Security
Grid Trust
behavioral based trust metrics
Mathematical model
Metrics
microsoft windows
Monitoring
network anomaly detection
network security
power engineering computing
biblio
Study of secure boot with a FPGA-based IoT device
Submitted by grigby1 on Mon, 06/11/2018 - 3:23pm
bitstream decoding
network on chip security
Xilinx Zynq-7000 Series System-on-Chip ZC706 prototype board
Trojan Horse attacks
software-based security implementation
Secure Boot
IoT system
infrastructure components
host processor computation power
FPGA-based IoT device
FPGA design
FPGA bitstream
encrypt system boot image
effective security provisioning
critical components
pubcrawl
system-on-chip
Decoding
Metrics
resilience
system security
field programmable gate arrays
Trojan horses
authentication
encryption
Cryptography
Internet of Things
Scalability
Resiliency