Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber physical security
biblio
IR-Drop Calibration for Hardware Trojan Detection
Submitted by grigby1 on Mon, 11/08/2021 - 1:36pm
process deviation
Voltage measurement
Trojan horses
trojan horse detection
supply chain security
Semiconductor device measurement
Ring Oscillator
Resiliency
resilience
pubcrawl
composability
Power supplies
IR-drop
Integrated circuit modeling
hardware trojan
Hardware
Frequency measurement
cyber physical systems
cyber physical security
biblio
A Novel Golden-Chip-Free Clustering Technique Using Backscattering Side Channel for Hardware Trojan Detection
Submitted by grigby1 on Mon, 11/08/2021 - 1:36pm
pubcrawl
Trojan horses
trojan horse detection
Trojan detection
supply chain security
Statistics
Sociology
reverse engineering
Resiliency
resilience
backscatter
integrated circuits
hardware trojan
Hardware Security
Hardware
cyber physical systems
cyber physical security
composability
clustering
Backscattering side-channel
biblio
Hardware Trojan Detection Based on SRC
Submitted by grigby1 on Mon, 11/08/2021 - 1:35pm
resilience
Trojan horses
trojan horse detection
Training
supply chain security
sparse representation-based classifier (SRC)
Size measurement
security
Resiliency
composability
pubcrawl
Noise measurement
machine learning
integrated circuits
hardware trojan
Hardware
cyber physical systems
cyber physical security
biblio
Hardware Trojan Detection Method Based on the Frequency Domain Characteristics of Power Consumption
Submitted by grigby1 on Mon, 11/08/2021 - 1:35pm
Hardware
Trojan horses
trojan horse detection
time-domain analysis
supply chain security
resilience
pubcrawl
Power demand
power analysis
Mahalanobis distance
Integrated circuit modeling
hardware trojan
Time Frequency Analysis and Security
frequency-domain analysis
Fourier transform
encryption
cyber physical systems
cyber physical security
composability
AES encryption circuit
Scalability
Predictive Metrics
Resiliency
biblio
Hardware Trojans Detection Based on BP Neural Network
Submitted by grigby1 on Mon, 11/08/2021 - 1:35pm
Power demand
Trojan horses
trojan horse detection
supply chain security
standards
side channel analysis
Resiliency
resilience
pubcrawl
Backpropagation
Neural networks
hardware trojan
Hardware
encryption
cyber physical systems
cyber physical security
composability
BP Neural Network
biblio
Hardware Trojan Detection Using Power Signal Foot Prints in Frequency Domain
Submitted by grigby1 on Mon, 11/08/2021 - 1:34pm
Hardware
Trojan horses
trojan horse detection
time-domain analysis
supply chain security
resilience
pubcrawl
Power demand
Logic gates
Hardware Trojan (HT) detection
Hardware Security
Time Frequency Analysis and Security
frequency-domain analysis
Frequency domain and Power footprints
delays
cyber physical systems
cyber physical security
composability
Scalability
Predictive Metrics
Resiliency
biblio
Trojan Traffic Detection Based on Machine Learning
Submitted by grigby1 on Mon, 11/08/2021 - 1:34pm
pubcrawl
Trojan horses
trojan horse detection
Trojan detection
Training
Traffic analysis
supply chain security
Resiliency
resilience
random forests
Classification algorithms
Network behavior analysis
machine learning algorithms
machine learning
feature extraction
Data models
cyber physical systems
cyber physical security
composability
biblio
ADobf: Obfuscated Detection Method against Analog Trojans on I2C Master-Slave Interface
Submitted by grigby1 on Mon, 11/08/2021 - 1:34pm
obfuscation
Trojan horses
trojan horse detection
Trojan detection
supply chain security
Sensitivity
Resistors
Resiliency
resilience
pubcrawl
Communication channels
Master-slave
I2C
hardware trojan
Hardware
cyber physical systems
cyber physical security
composability
analog Trojan
Clocks
biblio
A Collaborative Defense for Securing Protective Relay Settings in Electrical Cyber Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 2:11pm
power systems infrastructures
cyber physical security
cyber-attack
cyber-physical test bed
defense systems
domain based rules
electrical cyber physical systems
energy cyber-physical systems
IEC 61850 GOOSE messages
malicious change
modern power systems
neighboring devices
peer-to-peer communication
Critical Infrastructure Protection
Protection and Control
protection settings
Protective relaying
Protective Relays
relay coordination
relay coordination principles
securing protective relay settings
setting changes
setting rules
simulated cyber-attacks
CPS resilience
power system faults
collaboration
security
cyber-physical systems
pubcrawl
resilience
Resiliency
embedded systems
cyber security
power engineering computing
control layer
IEC standards
security of data
power system reliability
IEC 61850
substation automation
Substations
relay protection
Power system protection
circuit breakers
cyber physical systems
actual relays
Collaborative Defense
computing technologies
biblio
Physical Integrity Attack Detection of Surveillance Camera with Deep Learning based Video Frame Interpolation
Submitted by grigby1 on Fri, 07/03/2020 - 1:15pm
learning (artificial intelligence)
video surveillance
Surveillance Camera Physical Tampering
surveillance camera
security of data
Scalability
Resiliency
resilience
pubcrawl
physical spaces
physical security attacks
physical integrity attack detection
physical configuration
physical attributes
Metrics
Anomaly Detection
interpolation
integrity attacks
deep video
deep learning-based video frame interpolation
deep learning algorithms
deep learning
cyber-physical systems
cyber security attacks
cyber physical security
cyber physical devices
cyber physical attacks
Cameras
camera positions
« first
‹ previous
1
2
3
4
next ›
last »