Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
integrated circuits
biblio
A Novel Use of Approximate Circuits to Thwart Hardware Trojan Insertion and Provide Obfuscation
Submitted by grigby1 on Fri, 03/15/2019 - 11:58am
invasive software
Tunneling magnetoresistance
Trojan horses
trojan horse detection
Thwart Hardware Trojan insertion
Sensitivity
security of data
pubcrawl
prevention methods
original circuit
novel prevention technique
malicious modifications
logic circuits
ad-hoc design rules
integrated circuits
integrated circuit industry
Hardware Trojans
hardware trojan
Hardware
fabricated IC
error detection
critical circuits
Circuit faults
approximation
approximate logic circuit
biblio
A Study on Quantitative Risk Assessment Methods in Security Design for Industrial Control Systems
Submitted by grigby1 on Wed, 03/06/2019 - 4:24pm
risk scoring systems
Metrics
Pervasive Computing Security
production engineering computing
pubcrawl
Quantitative risk assessment
quantitative risk assessment methods
resilience
Resiliency
risk management
Measurement
risk-score dispersion
SCADA(Supervisory Control and Data Acquisition)
security
security design
security of data
security threats
Terms—industrial control systems (ICS)
three-phase risk assessment method
CWSS
automotive-security guideline
Autonomic Security
big data security
composability
control devices
control engineering computing
control systems
CVSS
Automotive engineering
data logger
data loggers
ICS risk assessment
industrial control
Industrial Control Systems
integrated circuits
JASO TP15002
manufacturing systems
biblio
The ODNI-OUSD(I) Xpress Challenge: An Experimental Application of Artificial Intelligence Techniques to National Security Decision Support
Submitted by grigby1 on Fri, 02/08/2019 - 4:14pm
Decision support systems
artificial intelligence security
warfighters
US Intelligence Community
unstructured text
summarization
sensemaking
public prize challenge
public administration
policymakers
ODNI-OUSD(I) xpress challenge
national security decision support
National security
machine analytics
intelligence community
pubcrawl
decision support
artificial intelligence techniques
analytic product
natural language processing
uncertainty
Government
Artificial Intelligence
Task Analysis
integrated circuits
composability
Resiliency
Metrics
Human behavior
biblio
Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening
Submitted by grigby1 on Mon, 01/21/2019 - 12:30pm
Internet of Things
Transportation
security of data
security economics
security
resilient IIoT systems
Resiliency
resilience
Redundancy
pubcrawl
production engineering computing
Metrics
Investment
actuator security
integrated circuits
industrial platforms
Industrial Internet of Things
IIoT system security
Human behavior
cyber-security risks
cyber-attacks
cyber physical systems
critical infrastructures
composability
actuators
biblio
Improving Power amp; Latency Metrics for Hardware Trojan Detection During High Level Synthesis
Submitted by grigby1 on Mon, 12/10/2018 - 11:42am
Mathematical model
work factor metrics
Unroll Factor
Trojan horses
third party IP cores
Space exploration
semiconductor industry
secure IC design process
Scalability
resource allocation
Resiliency
resilience
pubcrawl
power metrics
power consumption
microprocessor chips
adders
latency metrics
invasive software
integrated circuits
integrated circuit design
integrated chip design
high level synthesis
hardware Trojan detection
hardware trojan
Hardware
design-for-trust techniques
design space exploration process
Design Space Exploration
datapath resource allocation
cuckoo search algorithm
Benchmark testing
biblio
Towards scalable and adaptable security monitoring
Submitted by grigby1 on Fri, 09/28/2018 - 4:15pm
Monitoring
security of data
security
scalable security monitoring
Scalability
Resiliency
resilience
pubcrawl
Protocols
proprietary technology
process control
physical- cyber domain
physical isolation
adaptable security monitoring
Metrics
intrusions
integrated circuits
Industrial Control Systems
industrial control
Image edge detection
edge detection
data reduction approaches
data reduction
cyber-physical systems
control system security
composability
biblio
Anomaly Detection System Based on Classifier Fusion in ICS Environment
Submitted by grigby1 on Wed, 07/18/2018 - 10:06am
classifier
Anomaly Detection
anomaly detection system
Classification algorithms
Support vector machines
Training
Decision trees
demanding tasks
ICS Anomaly Detection
pattern classification
production engineering computing
pubcrawl
ICS cyber defense
ICS environment
reliable ICS cyber defense
resilience
supervised anomaly detection
classifier fusion
classifiers algorithms
computer security
industrial control
industrial control system
Resiliency
Scalability
critical information infrastructure
cyber security
Industrial Control Systems
integrated circuits
security of data
sensor fusion
cyber-attacks
Intrusion Detection
biblio
Intrusion Detection of Industrial Control System Based on Modbus TCP Protocol
Submitted by grigby1 on Wed, 07/18/2018 - 10:05am
protocol parsing
transport protocols
telecommunication traffic
telecommunication control
stereo depth IDS
semantic analysis
security of data
SD-IDS
Scalability
rule extraction
Resiliency
resilience
pubcrawl
Protocols
deep inspection
period
modbus TCP protocol
Lenses
Intrusion Detection
integrated circuits
Inspection
industrial traffic
industrial network protocol
Industrial Control Systems
industrial control system
industrial control
ICS Anomaly Detection
biblio
Cyber-Attack Detection for Industrial Control System Monitoring with Support Vector Machine Based on Communication Profile
Submitted by grigby1 on Wed, 07/18/2018 - 10:05am
IDS
penetration tests
privacy
production engineering computing
Support vector machines
Training
cyber-attack detection
Europe
ICS Anomaly Detection
pubcrawl
resilience
ICS communication profile
support vector machine
industrial control
industrial control system monitoring
Resiliency
Scalability
security
security of data
integrated circuits
Intrusion Detection Systems
cyber security test
Monitoring
biblio
Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks
Submitted by grigby1 on Wed, 07/18/2018 - 10:05am
resilience
multilevel anomaly detection method
network package content analysis
package content level anomaly detection
package signatures
package traffic
pattern classification
production engineering computing
Protocols
pubcrawl
recurrent neural nets
LSTM networks
Resiliency
SCADA systems
Scalability
signature database
software packages
stacked long short term memory network-based softmax classifier
time series
time-series anomaly detection
time-series structure
field devices
baseline signature database
Bloom filter
Bloom filters
communication patterns
control engineering computing
data structures
database management systems
Databases
Detectors
digital signatures
Anomaly Detection
gas pipeline SCADA system
ICS Anomaly Detection
ICS networks
industrial control
Industrial Control Systems
integrated circuits
Intrusion Detection
learning (artificial intelligence)
long short term memory networks
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »