Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Logic gates
biblio
A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications
Submitted by grigby1 on Tue, 01/23/2018 - 3:28pm
policy-based governance
Mobile Application
mobile computing
PAM component
PMG component
Policy
Policy Activity Monitor component
Policy Based Governance
Policy Match Gate component
Policy Proxy DB
Policy Validation Unit
Logic gates
PPDB
protected cloud SaaS resources
pubcrawl
PVU
security
Servers
session management
user authentication
web applications
cloud SaaS applications
authentication
authorisation
authorization
authorized access
Big Data
big data security in the cloud
client authentication
Cloud Computing
cloud resource security
access management
collaboration
computing industry
data privacy
Databases
internet
Internet of Things
IT resources sharing
JSON token-based authentication
JSON Web Token (JWT)
biblio
Evolution of logic locking
Submitted by grigby1 on Tue, 01/23/2018 - 3:24pm
collaboration
composability
integrated circuits
IP piracy
Logic gates
manufacturing
Policy
policy-based governance
pubcrawl
Resiliency
reverse engineering
side-channel attacks
supply chains
biblio
Identifying Reversible Circuit Synthesis Approaches to Enable IP Piracy Attacks
Submitted by grigby1 on Tue, 01/23/2018 - 3:24pm
Logic gates
Training data
TBS
Support vector machines
security
Reversible logic
reversible circuit synthesis approaches
Resiliency
QMDD
pubcrawl
policy-based governance
Policy
network synthesis
machine learning algorithms
machine learning
BDD
logic design
logic circuits
learning (artificial intelligence)
IP piracy attacks
IP piracy
Interference
integrated circuit piracy
Integrated circuit modeling
industrial property
ESOP
embedded function
composability
collaboration
biblio
Dynamically obfuscated scan for protecting IPs against scan-based attacks throughout supply chain
Submitted by grigby1 on Tue, 01/23/2018 - 3:21pm
Resiliency
ip protection
Logic gates
noninvasive scan attacks
pattern generation time
Policy
policy-based governance
pubcrawl
Registers
intellectual property
scan-based attacks
scan-based test
Secure Scan
security
Supply Chain
supply chains
Testability
automatic test pattern generation
integrated circuits
integrated circuit testing
integrated circuit test flow
integrated circuit manufacturing
integrated circuit manufacture
integrated circuit design
industrial property
EDA generated scan chains
dynamically-obfuscated scan design
Discrete Fourier transforms
composability
collaboration
Clocks
chip security
boundary scan testing
biblio
A privacy-preserving homomorphic encryption scheme for the Internet of Things
Submitted by grigby1 on Tue, 01/16/2018 - 6:36pm
hop-by-hop encryption
smart things
sensors
secure cooperation
secret sharing
Scalability
resource constrained devices
Resiliency
pubcrawl
privacy homomorphism
Metrics
Logic gates
IoT
Internet of Things
Human Factors
Additives
Homomorphic encryption
heterogeneous smart things
fully additive secret sharing
fully additive encryption
end-to-end encryption
encryption
Elliptic curves
elliptic curve
disruptive paradigm
data concealment
data analysis module
Cryptography
context-aware decision mechanisms
ambient environment
biblio
Moving target defense for securing smart grid communications: Architecture, implementation evaluation
Submitted by grigby1 on Tue, 01/16/2018 - 6:31pm
smart grid communications
power grid SCADA environment
power system security
privacy
pubcrawl
realistic environment
Resiliency
SCADA communications
SCADA system
SCADA systems
security of data
port mutation
smart power grids
sophisticated cyber-attacks
static system characteristics
supervisory control and data acquisition
target system
targeted cyber-attacks
Throughput
throughput characteristics
trusted peers
end-to-end IP-Hopping technique
attacker
CI
Communication Network
computer network security
computer security
Conferences
critical infrastructure
critical infrastructures
data acquisition
attack complexity
hopping rates
Iowa State PowerCyber
IP-Hopping
Logic gates
Manganese
Metrics
moving target defense
Moving Target Defense strategy
MTD Architecture
biblio
A symmetric address translation approach for a network layer moving target defense to secure power grid networks
Submitted by grigby1 on Tue, 01/16/2018 - 6:31pm
power system security
wide area networks
symmetric packet scheduling rules
symmetric address translation
supervisory control and data acquisition network
supervisory control and data acquisition
Substations
security
scheduling
SCADA systems
SCADA network
SCADA
Resiliency
pubcrawl
computer network security
power grids
power grid network security
Network Address Translation
MTD
moving target defense
Metrics
Logic gates
Local area networks
IP-Hopping
IP networks
Cyber Physical System
critical infrastructure
biblio
A Cross-Layer Security Solution for Publish/Subscribe-Based IoT Services Communication Infrastructure
Submitted by grigby1 on Wed, 01/10/2018 - 12:24pm
IoT services collaborations
telecommunication security
security policies
Routing
route events
Resiliency
publish/subscribe paradigm
Publish/Subscribe
pubcrawl
Niobium
multicast IoT service interactions
middleware
loose coupling
Logic gates
IoT services communication infrastructure
Access Control
IoT service communication infrastructure
IoT Service
Internet of Things
indirect IoT service interactions
Homomorphic encryption
event visibility
event producers
event consumers
encryption
cross-layer security solution
Cross Layer Security
composability
authorization
anonymous IoT service interactions
biblio
Science DMZ: SDN based secured cloud testbed
Submitted by grigby1 on Thu, 12/28/2017 - 1:36pm
Policy-Governed Secure Collaboration
visualization
software defined networking
Servers
security
Science of Security
Scalability
Resiliency
pubcrawl
Cloud Computing
Metrics
Logic gates
Human Factors
Human behavior
Conferences
composability
collaboration
biblio
Wells turbine modeling and PI control scheme for OWC plant using Xilinx system generator
Submitted by grigby1 on Wed, 12/20/2017 - 8:51pm
oscillating behaviors
Xilinx System Generator
Well turbine
Turbines
Torque
Resiliency
pubcrawl
PI control
Oscillating Water Column
Atmospheric modeling
Metrics
Mathematical model
Logic gates
Irregular wave
Generators
DC motors
composability
« first
‹ previous
…
19
20
21
22
23
24
25
26
27
next ›
last »