Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
physical attacks
biblio
Real-Time Adaptive Sensor Attack Detection in Autonomous Cyber-Physical Systems
Submitted by grigby1 on Tue, 07/12/2022 - 2:37pm
Measurement
Cyber Dependencies
detection
real-time
autonomous cyber-physical systems
physical attacks
Sensor Systems
Recurrent neural networks
Detectors
Compositionality
Prediction algorithms
deep learning
Metrics
real-time systems
composability
Scalability
security
Resiliency
resilience
Human behavior
pubcrawl
biblio
Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application
Submitted by grigby1 on Mon, 03/29/2021 - 11:02am
microcontrollers
similar MCU-based applications
security risks
security of data
security challenges
secure embedded IoT applications
safety-critical software
safety-critical applications
resilient applications
Resiliency
resilience
pubcrawl
power system security
physical attacks
patient care
composability
Metrics
Internet of Things (IoT)
Internet of Things
hardware security vulnerability assessment
hardware security assessment approach
Hardware Security
fault injection attacks
fault injection attack
Fault Attacks
embedded systems
embedded software developers
Detection and Mitigation
critical medical IoT device
critical embedded application
biblio
SACHa: Self-Attestation of Configurable Hardware
Submitted by aekwall on Mon, 08/17/2020 - 10:36am
hardware-software system
tamper-resistant hardware module
Software
self-attestation
SACHa
Resiliency
remote attacks
Read only memory
pubcrawl
Protocols
physical attacks
Microprocessors
intended application code
Human behavior
attestation
hardware-based attestation
Hardware
FPGAs
Field-Programmable Gate Arrays
field programmable gate arrays
embedded systems
embedded software
embedded device
device attestation
configurable hardware
configurable FPGA hardware
computer architecture
composability
biblio
A multi-modelling based approach to assessing the security of smart buildings
Submitted by grigby1 on Thu, 07/16/2020 - 10:57am
methodology
ubiquitous computing
system components
smart buildings
simulations
security of data
Resiliency
resilience
pubcrawl
physical attacks
multimodelling based approach
multimodel methodology
Metrics
Access Control
man-in-the-middle attacks
INTO-CPS tool chain
home automation
Fans
fan coil unit
cyber-physical systems
critical services
CPS modeling
composability
co-simulation
building management systems
adversary model
biblio
Sequential Node/Link Recovery Strategy of Power Grids Based on Q-Learning Approach
Submitted by grigby1 on Mon, 03/02/2020 - 12:36pm
power system reliability
System recovery
smart power grids
Smart Grids
sequential recovery
sequential node-link recovery strategy
security of data
restoration process
Resiliency
resilience
Reinforcement learning
recovery strategies
Q-learning approach
q-learning
pubcrawl
power system restoration
Cascading Failures
Power system protection
power system faults
power grids
power grid test benchmarks
Power Grid
power generation
power flow cascading failure
power engineering computing
physical attacks
Load flow
learning (artificial intelligence)
large-scale smart grids
grid defender
Cyber Attacks
biblio
Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV
Submitted by aekwall on Mon, 03/02/2020 - 11:25am
minimum human interventions
vehicle sensors
Physical Unclonable Function
two-factor authentication
AKA protocol
elaborate security analysis
ever-increasing penetration
factor authentication protocol
Internet of Vehicles
IoV
key agreement protocol
Physical attack
mutual authentication
onboard sensors
physically secure authentication
route planning
secret information
transportation sector
user device
vehicle management
two factor authentication
authentication
authorisation
data privacy
Internet of Things
telecommunication security
Cryptographic Protocols
Protocols
pubcrawl
vehicular ad hoc networks
privacy
Servers
message authentication
password
public key cryptography
physical attacks
sensors
information protection
Human Factors
Security Properties
PUF
biblio
Hardware-enabled AI for Embedded Security: A New Paradigm
Submitted by aekwall on Mon, 02/17/2020 - 1:21pm
security of data
multiple security sensors
physical attacks
privacy
pubcrawl
Resiliency
Scalability
security
security event handling
Monitoring
security-oriented AI logic
sensor security
signal processing security
silicon area
sufficient protection level
Temperature measurement
Temperature sensors
threat detection
embedded security
Artificial Intelligence
Artificial Intelligence (AI)
chip power budget
chip security
composability
Cyber-Physical Attacks.
Cyber-Protection
decision making process
artificial intelligence security
hardware-enabled AI
heterogeneous security sensors
Human behavior
Intelligent sensors
learning (artificial intelligence)
learning procedures
low false positive detection rate
Metrics
biblio
Let's Shock Our IoT's Heart: ARMv7-M Under (Fault) Attacks
Submitted by grigby1 on Mon, 11/04/2019 - 11:35am
Backdoor
buffer overflow
composability
Electromagnetic Fault Injection (EMFI)
Fault injection
Human behavior
Human Factors
microcontroller
physical attacks
pubcrawl
resilience
Resiliency
return oriented programming
rop attacks
Scalability
Vulnerability Insertion
biblio
Capacitive Multi-Channel Security Sensor IC for Tamper-Resistant Enclosures
Submitted by aekwall on Mon, 03/25/2019 - 8:56am
CMOS integrated circuits
sensor security
time 19.7 ms
tamper-resistant enclosures
SNR
size 350.0 nm
sensor fusion
Semiconductor device measurement
physical interaction
physical attacks
noise figure 94.6 dB
integrated circuits
integrated circuit packaging
Electrodes
electrode matrix
CMOS technology
security
Capacitors
capacitive touch technology
capacitive sensors
capacitive multichannel security sensor IC
capacitance measurement
capacitance 460.0 aF
capacitance 35.0 aF
Capacitance
Metrics
composability
pubcrawl
Human behavior
Resiliency
embedded devices
biblio
Survey on Cryptanalysis of Code-Based Cryptography: From Theoretical to Physical Attacks
Submitted by grigby1 on Thu, 02/14/2019 - 10:12am
linear codes
theoretical cryptography
structural attacks
strong mathematical background
side-channel attacks
public-key cryptosystem
public-key cryptography
post-quantum standardization
Post-quantum cryptography
polynomials
polynomial time
oldest quantum-resistant proposition
number theory problems
number theory
NIST's announcement
McEliece scheme
pubcrawl
elliptic curve
discrete logarithm
coding theory
code-based cryptography
adequate post-quantum cryptographic schemes
quantum cryptography
side-channel analysis
public key cryptography
quantum computer
Decoding
Computers
Compositionality
physical attacks
encryption
composability
1
2
3
next ›
last »