Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
integrated circuits
biblio
Synthesis of Discrete Complex Nonlinear Signals with Necessary Properties of Correlation Functions
Submitted by aekwall on Mon, 02/17/2020 - 2:23pm
multiuser detection
correlation functions
cryptographic signal
discrete complex nonlinear signals
discrete sequence
distributed spectrum technology
finite field
ICS applications
interference (signal)
isomorphism
correlation function
multiuser systems
nonlinear discrete cryptographic signals
nonlinear discrete sequences
pseudorandom sequences
radio spectrum management
Random sequences
signal detecting
telecommunication systems
signal processing security
Resiliency
pubcrawl
composability
Cryptography
Metrics
Correlation
privacy
channel coding
integrated circuits
telecommunication security
correlation methods
information security
wireless channels
information and communication systems
Broadband communication
radiofrequency interference
autocorrelation properties
channels code division
biblio
Implementation and Evaluation of a Multi-Factor Web Authentication System with Individual Number Card and WebUSB
Submitted by aekwall on Mon, 02/10/2020 - 12:03pm
integrated circuits
WebUSB
public personal identification service
multifactor web authentication system
Multi-factor authentication
Individual Number Card
cryptographic authenticator
multifactor authentication
Pins
Digital identity
Human Factors
Servers
Public key
password
authentication
Cybersecurity
Internet users
internet
Metrics
pubcrawl
Resiliency
Cryptography
biblio
Hardware Trojan Detection Combine with Machine Learning: an SVM-based Detection Approach
Submitted by aekwall on Mon, 02/10/2020 - 11:43am
Predictive Metrics
Microelectronics Security
Xilinx SPARTAN-6
Trojan detection rate
Trojan detection
SVM-based detection approach
support vector machine classifier
support vector machine (SVM)
side-channel analysis (SCA)
side-channel analysis
SAKURA-G circuit board
IC
hardware Trojan detection
hardware trojan
security
integrated circuits
Trojan horses
Training
composability
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
Support vector machines
invasive software
Kernel
Hardware
field programmable gate arrays
biblio
Understanding Security Requirements for Industrial Control System Supply Chains
Submitted by grigby1 on Tue, 01/21/2020 - 12:16pm
Scalability
organizational aspects
Organizations
pubcrawl
resilience
Resiliency
risk assessment
risk decision-making
risk management
organisational aspects
security industrial control system supply chains
security requirements
Standards organizations
stuxnet attack
supply chain management
supply chain risk assessment
supply chains
supply chain security
nuclear facility
Natanz city
malware
Iran
integrated circuits
Industrial Control Systems Anomaly Detection
Industrial Control Systems
industrial control
human issues
Decision Making
cyber-physical systems
cyber-physical infrastructures
control system security
control engineering computing
Computer crime
biblio
Industrial Control Systems (Ics) Security in Power Transmission Network
Submitted by grigby1 on Tue, 01/21/2020 - 12:15pm
Organizations
supervisory control and data acquisition
Scalability
SCADA
Resiliency
resilience
pubcrawl
power transmission network
power transmission control
power system security
power stations
power grids
power distribution grids
power distribution control
Industrial Control Systems Anomaly Detection
IT security
integrated circuits
industrials plants
Industrial Control Systems
industrial control system security
industrial control
ICS security
ICs
Firewalls (computing)
firewall
Cybersecurity
control systems
biblio
An Efficient SAT-Attack Algorithm Against Logic Encryption
Submitted by grigby1 on Tue, 01/07/2020 - 10:54am
information science
Superluminescent diodes
SAT-attack algorithm
SAT
Resiliency
resilience
pubcrawl
logic IP protection
Logic gates
logic encryption
integrated circuits
Benchmark testing
encryption
encrypted circuits
efficient encryption
decryption
cyber physical systems
Cyber Physical System
Cryptography
computability
composability
biblio
Routing Aware and Runtime Detection for Infected Network-on-Chip Routers
Submitted by grigby1 on Mon, 11/04/2019 - 12:39pm
NoC
Trojan horses
system-on-chip
System recovery
security attacks
security
secure routing algorithm
secret key leaking
runtime detection
Runtime
Routing
Router Systems Security
Resiliency
resilience
pubcrawl
outsourcing
network on chip security
network-on-chip architecture
network-on-chip
network routing
Multiprocessors System-on-Chip
multiprocessing systems
MPSoC
Metrics
Malicious-tolerant Routing Algorithm
malicious Hardware Trojans
logic design
invasive software
integrated circuits
hardware trojan
Hardware
biblio
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones
Submitted by grigby1 on Wed, 10/30/2019 - 10:52am
Licenses
ZMap
unintended IPv6 connectivity
sensitive data exposure
Security by Default
security
Scalability
RNA
Revere DNS (rDNS)
Resiliency
resilience
pubcrawl
privacy
principal component analysis
network scanning
Network reconnaissance
computer network security
large-scale security scans
IPv6 hosts
IPv6 address space
IPv6
IPv4 hosts
IP networks
internet-wide scans
Internet-connected devices
Internet of Things devices
Internet of Things
internet
integrated circuits
DNSSEC-signed IPv6 reverse zones
DNSsec
DNS
biblio
Improvement of Security System Level in the Cyber-Physical Systems (CPS) Architecture
Submitted by grigby1 on Wed, 09/11/2019 - 2:43pm
Metrics
smart cloud computing adoption framework
Smart CCAF
security system level
security of data
security framework
security
SCCAF
Resiliency
resilience
pubcrawl
production engineering computing
physical entities
node information
Microelectronics Security
Microelectronics
Cloud Computing
IoT
Internet of Things
integrated circuits
information security
Industry 4.0
Detectors
cyber-physical systems
CPS architecture
CPS
computer elements
computer architecture
Computational modeling
composability
cloud computing technology
biblio
Architectural Security Weaknesses in Industrial Control Systems (ICS) an Empirical Study Based on Disclosed Software Vulnerabilities
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
industrial control
supervisory control
Software
security weaknesses
security of data
security
SCADA systems
SCADA configuration
resilience
pubcrawl
policy-based governance
PLC
Metrics
internet
integrated circuits
Industrial Control Systems
architectural root cause
industrial automation
improper input validation
ICS systems
human-machine interfaces
Human Factors
Human behavior
disclosed software vulnerabilities
Data mining
data acquisition
control systems
computer architecture
component-based architectures
common security architectural weaknesses
common architectural security weaknesses
authorisation
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »