Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
integrated circuits
biblio
Identity management using blockchain for cognitive cellular networks
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
pubcrawl
integrated circuits
network signaling traffic
opportunistic network access technologies
Performance
privacy
privacy-enhancing user identity management system
Protocols
pseudonymous identities
Identity management
radio spectrum management
Resiliency
Scalability
spectrum crunch
telecommunication network management
telecommunication security
telecommunication signalling
telecommunication traffic
Cloud Computing
assertion
authentication
authorization
blockchain
blockchain technology
Cellular networks
cellular radio
cloud-centric cognitive cellular networks
accounting
cognitive cellular network blockchain
cognitive radio
contracts
Cryptography
dynamic spectrum access
end-to-end management
Human behavior
biblio
Trustworthy design architecture: Cyber-physical system
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
security patch updates
integrated circuits
physical characteristics
physical component
physically verifiable whitelists
pubcrawl
Resiliency
Resilient Security Architectures
Security Operations Center
Industries
Software
system dependencies
TDA
Trustworthy design architecture
Trustworthy Systems
unclonable digital identity
unique system engineering technique
whitelisted system
cyber identities
authentication
computer architecture
Computer crime
conceptual system engineering framework
conventional cyber defenses
costly functional impact tests
CPS
critical infrastructures
Cyber Dependencies
cyber risks
cyber-physical systems
cyber-physical traits
defense
digital characteristics
digital commands
digitally unclonable function
biblio
Threat awareness for critical infrastructures resilience
Submitted by K_Hooper on Fri, 02/02/2018 - 11:05am
Resiliency
Context
critical infrastructure resilience
critical infrastructures
Data protection
Europe
European utility company
integrated circuits
Market research
pubcrawl
public utilities
resilience
utility network protection
Resilient Security Architectures
security
Security Awareness
security of data
security risk
Smart Grids
social engineering
Software Architecture
threat awareness
threat awareness architecture
biblio
Cyber-resilient industrial control system with diversified architecture and bus monitoring
Submitted by K_Hooper on Fri, 02/02/2018 - 11:05am
ICs
actuators
bus monitoring
computer architecture
control engineering computing
controller architecture
cyber vulnerabilities
cyber-resilient industrial control system
Cybersecurity
cybersecurity test bed
DeterLab
Hardware
security of data
industrial control
integrated circuits
Monitoring
production engineering computing
pubcrawl
Resiliency
resiliency approach
Resilient Security Architectures
Robustness
safety-critical ICS
SCADA
biblio
Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
message authentication
threat
smart devices
Service Access
security-critical operations
security
secure bootstrapping
Scalable Security
scalable
Scalability
pubcrawl
privacy-aware authentication scheme
privacy
network access
adversary
IoT systems
Internet of Things
integrated circuits
Electronics packaging
Device-to-device communication
data privacy
Cyber Attacks
computer bootstrapping
Cameras
Boot-IoT
authorisation
authentication
attack
biblio
Evolution of logic locking
Submitted by grigby1 on Tue, 01/23/2018 - 3:24pm
collaboration
composability
integrated circuits
IP piracy
Logic gates
manufacturing
Policy
policy-based governance
pubcrawl
Resiliency
reverse engineering
side-channel attacks
supply chains
biblio
Dynamically obfuscated scan for protecting IPs against scan-based attacks throughout supply chain
Submitted by grigby1 on Tue, 01/23/2018 - 3:21pm
Resiliency
ip protection
Logic gates
noninvasive scan attacks
pattern generation time
Policy
policy-based governance
pubcrawl
Registers
intellectual property
scan-based attacks
scan-based test
Secure Scan
security
Supply Chain
supply chains
Testability
automatic test pattern generation
integrated circuits
integrated circuit testing
integrated circuit test flow
integrated circuit manufacturing
integrated circuit manufacture
integrated circuit design
industrial property
EDA generated scan chains
dynamically-obfuscated scan design
Discrete Fourier transforms
composability
collaboration
Clocks
chip security
boundary scan testing
biblio
Security challenges and methods for protecting critical infrastructure cyber-physical systems
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
denial of service
weak information security applications
sensors
security of data
security
Scalability
Resiliency
replay
pubcrawl
Protocols
Modbus
integrity
integrated circuits
information technology systems
Information Assurance
Industrial Control Systems
agent based game theoretic
cyber-physical systems
cyber-physical attackers
cyber-physical adversary
cyber attackers
critical infrastructures
critical infrastructure cyber-physical systems
CPS system
covert communications channel
covert channels
confidentiality
Computer crime
Compositionality
Communication networks
attack tree
biblio
Dr. WATTson: Lightweight current-based Intrusion Detection (CBID)
Submitted by grigby1 on Mon, 11/20/2017 - 12:28pm
internet
Voltage measurement
Voltage Characteristics
Tamper-Resistance
Tamper resistance
SCADA systems
SCADA
Resiliency
resilience
pubcrawl
Power measurement
lightweight current-based intrusion detection
lightweight current-based IDS
knowledge-based detection
Intrusion Detection
batteries
integrated circuits
Industrial Control Systems
industrial control
IDS
ICs
false alarm rate
Dr. WATTson
Data Breach
Current measurement
Current Drain Intrusion Detection
computer network security
composability
CBID
behavior-based detection
biblio
Reconnaissance of Industrial Control System by deep packet inspection
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
network protocol
Traffic classification
telecommunication traffic
Resiliency
Reconnaissance
pubcrawl
Protocols
Ports (Computers)
Payloads
network traffic
Network reconnaissance
Communication Network
integrated circuits
Inspection
Industrial Control System (ICS)
industrial control system
industrial control
electronic devices
Deep Packet Inspection (DPI)
deep packet inspection
complex system
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »