Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
supply chains
biblio
NCSC Unveils New Supply Chain Risk Management Guidance
Submitted by willirn1 on Fri, 10/22/2021 - 11:13am
C3E
supply chains
risk assessment
Cybersecurity
biblio
Implementing Cyber Security in DoD Supply Chains
Submitted by willirn1 on Fri, 10/22/2021 - 10:54am
C3E
Cybersecurity
Department of Defense
supply chains
biblio
Cyber Security in Supply Chains, CAPS Research
Submitted by willirn1 on Fri, 10/22/2021 - 10:50am
video
Cybersecurity
supply chains
C3E
biblio
On-Chip Randomization for Memory Protection Against Hardware Supply Chain Attacks to DRAM
Submitted by grigby1 on Tue, 07/27/2021 - 12:33pm
resilience
pubcrawl
Resiliency
Software
Hardware
system-on-chip
Scalability
Cryptography
Memory Protection
Security by Default
Random access memory
supply chains
circuit simulation
Cold Boot Attack
DRAM
Rowhammer attack
supply chain protection
biblio
The Performance Evaluation and Resilience Analysis of Supply Chain Based on Logistics Network
Submitted by grigby1 on Wed, 06/02/2021 - 12:31pm
complex network
complex networks
Control Theory
graph database
Human behavior
Indexes
Neo4j
pubcrawl
resilience
resilience evaluation
Resiliency
Robustness
Scalability
supply chain network
supply chains
biblio
A Holistic Approach to Cyber Physical Systems Security and Resilience
Submitted by grigby1 on Mon, 03/29/2021 - 11:57am
software assurance
resilience
Resiliency
Resilient Systems
Risk
SAE G-32 Cyber Physical Systems Security Committee
secure systems
security
security of data
Software
pubcrawl
standards
supply chains
system integrators
system security
system security considerations
systems engineering
threats
Trustworthy Systems
Vulnerability
firmware assurance
affordable systems
composability
computer security
cyber
cyber physical system security framework
cyber weaknesses
cyber-physical systems
cybersecurity.
embedded systems
CPS resilience
global supply chain
Hardware
Hardware Assurance
holistic approach
holistic systems engineering approach
Industries
Metrics
Mission Assurance
biblio
Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory
Submitted by aekwall on Mon, 03/29/2021 - 11:51am
Repeated game
zero-sum
third-party companies
prospect theory
optimal deception rationality
offshore manufacturing
multilevel game-theoretic framework
manufactured ICs
malicious IC manufacturer
learning stage
IC designers
Hardware Trojans
hardware Trojan detection
first-step deception mitigation process
deception analysis
actual game stage
Scalability
hypergame theory
integrated circuits
game theoretic security
Predictive Metrics
Human Factors
Cybersecurity
supply chains
Supply Chain
pubcrawl
Resiliency
learning (artificial intelligence)
deception
invasive software
game theory
biblio
Trustworthiness in Supply Chains : A modular extensible Approach applied to Industrial IoT
Submitted by aekwall on Mon, 12/21/2020 - 1:34pm
Configurability
utility calculation
trustworthy operation
trustworthiness profiles
profile
modular model
modular extensible approach
Industrial IoT
Industrial Internet Security Framework
industrial internet consortium
dynamically evaluable form
dynamic evaluation
dynamic assessment
cross-company Industry
computer network security
behaviour-based context-based
automatically verifiable operations
automatable trust models
regulatory requirements
trustworthiness
production engineering computing
supply chain management
supply chains
Metrics
composability
pubcrawl
Trusted Computing
Internet of Things
biblio
BLIC: A Blockchain Protocol for Manufacturing and Supply Chain Management of ICS
Submitted by aekwall on Mon, 11/09/2020 - 1:33pm
active IC transactions
distributed ledger
ICs
integrated circuit design
Watermarking
electronic engineering computing
blockchain protocol
IP piracy
split manufacturing
blockchain technology
advanced technologies
BLIC protocol
composite consensus protocol
deleterious design modification
huge paradigm shift
IC supply chains
passive IC transactions
blockchain
data privacy
Hardware
Protocols
Resiliency
pubcrawl
composability
policy-based governance
Peer-to-peer computing
Cryptography
Computer crime
supply chain management
supply chains
manufacturing
cryptocurrencies
smart contracts
integrated circuits
biblio
Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network
Submitted by aekwall on Mon, 08/24/2020 - 1:36pm
power engineering computing
cyberattack
cyberattack vectors
Cybercrime
cybercrime phenomenon
DAG method
inference mechanisms
invasive software
Knowledge representation
cyber-physical systems
probabilistic inference
pubcrawl
Resiliency
smart power grids
supply chains
threat probability
uncertainty
CPS domain
Scalability
Artificial Intelligence
Bayes methods
Bayesian belief network
Bayesian belief networks
belief networks
composability
Computer crime
Chained Attacks
CSC domain
Cyber Attacks
Cyber Physical System
cyber physical systems
cyber security domain
cyber supply chain attacks detection
Cyber Supply Chain Threats
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »