Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
integrated circuits
biblio
On the Feasibility of Generating Deception Environments for Industrial Control Systems
Submitted by aekwall on Mon, 07/01/2019 - 10:10am
SCADA
industrial control
Industrial Control Systems
integrated circuits
networked computer systems
operational ICS
proactive threat intelligence
pubcrawl
Resiliency
ICS networks
SCADA systems
SCADA Systems Security
security of data
supervisory control-and-data acquisition systems
threat intelligence
tools
Virtualization
composability
ICs
Human behavior
generating deception environments
deception
data acquisition systems
data acquisition
cyber threat landscape
cyber security
cyber defense
cyber defenders
critical physical processes
critical infrastructures
critical infrastructure environments
constantly morphing surface
computer network security
biblio
Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening
Submitted by willirn1 on Thu, 05/30/2019 - 4:04pm
Internet of Things
Vanderbilt
Transportation
security of data
security economics
security
resilient IIoT systems
resilience
Redundancy
production engineering computing
Investment
actuators
integrated circuits
industrial platforms
Industrial Internet of Things
IIoT system security
cyber-security risks
cyber-attacks
cyber physical systems
critical infrastructures
control
biblio
Resilient Distributed Diffusion for Multi-task Estimation
Submitted by willirn1 on Thu, 05/30/2019 - 3:00pm
wireless channels
multitask estimation
Resilient diffusion
Task Analysis
Degradation
Adaptation models
Distributed databases
integrated circuits
resilience
estimation
internet
mobile robots
Bluetooth
Data mining
social networking (online)
wireless sensor networks
Protocols
learning (artificial intelligence)
Internet of Things
Vanderbilt
biblio
Hardware-Based Memory Acquisition Procedure for Digital Investigations of Security Incidents in Industrial Control Systems
Submitted by grigby1 on Thu, 05/09/2019 - 10:47am
reliable code
malware
memory contents collecting
operating system
operating systems
operating systems (computers)
production engineering computing
pubcrawl
Reliability
malicious software functions
resilience
Resiliency
resulting contents
Scalability
scalable
security incidents
software methods
volatile memory
guaranteed reliability
attacked computer
comprehensive solutions
computer security
continuous monitoring systems
control engineering computing
data collection procedure
digital investigations
forensic
Operating systems security
hardware-based memory acquisition procedure
ICs
industrial control
Industrial Control Systems
information security
integrated circuits
invasive software
biblio
The Urgency of the Threats of Attacks on Interfaces and Field-Layer Protocols in Industrial Control Systems
Submitted by grigby1 on Thu, 05/09/2019 - 10:46am
integrated circuits
sensors
security of data
scalable
Scalability
Resiliency
resilience
pubcrawl
Protocols
process control
Current loop
information security systems
Industrial Control Systems
industrial control system information security
industrial control system field layer
industrial control system
industrial control
HART-protocol
Current measurement
biblio
Research of Industrial Control System Device Firmware Vulnerability Mining Technology Based on Taint Analysis
Submitted by grigby1 on Thu, 05/09/2019 - 10:46am
program testing
vulnerability mining
test efficiency
taint analysis technology
taint analysis
Software
security of data
security
scalable
Scalability
Resiliency
resilience
pubcrawl
component
Microprogramming
integrated circuits
Industrial Control Systems
industrial control system device firmware vulnerability mining technology
industrial control system
industrial control
Hardware
fuzzing test
firmware
device firmware
Data mining
biblio
Network Security Situation Awareness for Industrial Control System Under Integrity Attacks
Submitted by grigby1 on Thu, 05/09/2019 - 10:45am
novel security situation awareness framework
telecommunication security
system state estimation
state estimation
situation prediction algorithm
Situation Awareness
Sensor Systems
scalable
Scalability
Resiliency
resilience
pubcrawl
process control
Prediction algorithms
particle filtering (numerical methods)
particle filtering
Networked Control Systems Security
nonlinear systems
network security situation awareness
malicious attacks
local estimator
integrity attacks
integrated circuits
Industrial Control Systems
industrial control system network
industrial control system
industrial control
hazard situation detection
control systems
computer network security
Communication networks
biblio
Capacitive Multi-Channel Security Sensor IC for Tamper-Resistant Enclosures
Submitted by aekwall on Mon, 03/25/2019 - 9:56am
CMOS integrated circuits
sensor security
time 19.7 ms
tamper-resistant enclosures
SNR
size 350.0 nm
sensor fusion
Semiconductor device measurement
physical interaction
physical attacks
noise figure 94.6 dB
integrated circuits
integrated circuit packaging
Electrodes
electrode matrix
CMOS technology
security
Capacitors
capacitive touch technology
capacitive sensors
capacitive multichannel security sensor IC
capacitance measurement
capacitance 460.0 aF
capacitance 35.0 aF
Capacitance
Metrics
composability
pubcrawl
Human behavior
Resiliency
embedded devices
biblio
Variation-Aware Hardware Trojan Detection through Power Side-Channel
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
integrated logic circuits
variation-aware hardware Trojan detection
Trojan-to-circuit power consumption
Trojan horses
trojan horse detection
side-channel analysis
Sensitivity
pubcrawl
process variation
power side-channel
Power demand
outsourcing
logic design
invasive software
Clock-tree Partition
integrated circuits
integrated circuit testing
HT detection sensitivity
HT activation chances
hardware trojan
Hardware
fine-grain circuit partitioning
Equal-power Partition
Detection sensitivity
Detectability
Cryptography
Clocks
biblio
Exploiting Phase Information in Thermal Scans for Stealthy Trojan Detection
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
modulation
weak thermal hot spots
Trojan horses
trojan horse detection
Trojan detection
thermal scans
Thermal Mapping
Temperature measurement
stealthy hardware Trojan detection
pubcrawl
Phase measurement
phase information
Phase
amplitude analysis
measurement platform
Lock-in Thermography
invasive software
integrated circuits
infrared thermography
infrared signals
infrared imaging
Heating systems
Hardware
formidable alternative
detection method
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »