Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Silicon
biblio
Trust-Based Framework for Resilience to Sensor-Targeted Attacks in Cyber-Physical Systems
Submitted by grigby1 on Mon, 08/05/2019 - 10:36am
sensor-targeted attacks
Observers
policy-based governance
primary sensor
process control
process state
pubcrawl
resilience
Resiliency
Safety
Scalability
security
networked control systems
sensors
Silicon
stability
standard protocols
state estimates
state estimation
trust-based framework
Trusted Computing
weighted consensus
wireless sensor networks
false trust
closed loop systems
closed-loop control
collaboration
communication infrastructure
compromised sensors
computer network security
cyber-physical plants
cyber-physical systems
entire plant
false data injections
CPS resilience
far-flung locations
feedback
feedback signal
interconnected processes
local data
local process
malicious agents
Measurement
Monitoring
multisensor networked physical experiment
biblio
A Framework for Threat-Driven Cyber Security Verification of IoT Systems
Submitted by grigby1 on Fri, 06/28/2019 - 9:36am
scalable verification
model checking-based formal analysis
modeling
Object oriented modeling
production engineering computing
pubcrawl
resilience
Resiliency
Scalability
mitigation strategies
security
security of data
Security Properties
Silicon
system deployment
system security
threat-driven cyber security verification
Alloy
Metrics
Metals
IoT systems
IoT
Internet of Things
industrial IoT infrastructures
industrial control
formal verification
distributed industrial control systems
distributed control
control systems
Compositionality
Communication channels
attack patterns
Analytical models
biblio
Hierarchical Abnormal-Node Detection Using Fuzzy Logic for ECA Rule-Based Wireless Sensor Networks
Submitted by grigby1 on Wed, 05/01/2019 - 10:30am
security
lightweight monitoring system
malicious data-integrity attacks
malicious nodes
Metrics
Monitoring
network attacks
networked system
pubcrawl
resilience
Resiliency
IoT security
security of data
sensor correlations
Silicon
telecommunication security
Temperature measurement
Temperature sensors
Wireless Sensor Network
wireless sensor networks
WSNs
ECA rule-based wireless sensor networks
abnormal-node detection
abnormality thresholds
Correlation
data integrity
data integrity attack
data-integrity detection
dependability
dependable monitoring system
distributed system
abnormal nodes
ECA rules
embedded sensor devices
event-condition-action rule
failure handling
Fuzzy logic
heterogeneous sensor readings
hierarchical abnormal-node detection
hierarchical framework
Internet of Things
biblio
A Co-Training Based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models
Submitted by grigby1 on Fri, 03/15/2019 - 10:59am
Integrated circuit modeling
unlabeled ICs
unlabeled IC
unlabeled fabricated IC
Trojan horses
trojan horse detection
Training
simulated IC
Silicon
reliable detection capability
pubcrawl
pattern classification
learning (artificial intelligence)
invasive software
accurate classification model
inaccurate simulation models
IC labeling
hardware Trojan detection
Hardware Security
Hardware
golden chip
fabrication
fabricated golden chips
co-training based hardware Trojan detection technique
co-training
classification-based golden chips-free hardware Trojan detection technique
Classification algorithms
actual silicon fabrication
biblio
Grey Zone in Pre-Silicon Hardware Trojan Detection
Submitted by grigby1 on Fri, 03/15/2019 - 10:58am
invasive software
Trust-Hub
Trojan horses
trojan horse detection
Silicon
Si
pubcrawl
probability
pre-silicon hardware trojan detection method
Pre-Silicon Hardware Trojan Detection
machine learning
low signal probability
learning (artificial intelligence)
activation probability
integrated circuit testing
integrated circuit design
hardware Trojan benchmark circuits
Hardware
grey zone
functional test
elemental semiconductors
electronic engineering computing
benchmark
behaviour simulations
Behaviour Simulation
biblio
Nonlinear System Identification Method Based on Improved Deep Belief Network
Submitted by grigby1 on Wed, 03/06/2019 - 3:30pm
Mathematical model
Training
single crystal furnace
Silicon
shallow BP network
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
parameters identification
nonlinear systems
nonlinear system identification method
nonlinear control systems
Metrics
belief networks
improved deep belief network
Human behavior
higher identification accuracy
Deep Belief Network
DBN
Data models
Crystals
CRBM
continuous restricted Boltzmann machine
Continuous Resricted Boltzmann Machine
composability
collaboration
Boltzmann machines
Biological neural networks
biblio
Research on Risk Assessment Technology of Industrial Control System Based on Attack Graph
Submitted by grigby1 on Fri, 02/08/2019 - 3:28pm
Resiliency
network attacks
network security elements
network security risks
network state migration problems
probability
production engineering computing
pubcrawl
resilience
Metrics
risk assessment
risk assessment method
risk management
security
security of data
Servers
Silicon
Networked Control Systems Security
Industrial Control Systems
industrial control network attack graph model
industrial control
Grey relational degree
graph theory
CVSS evaluation system
Correlation
Control Theory
control engineering computing
composability
Communication networks
centralized control system
attack graphs
attack graph
atomic attack probability assignment method
biblio
Phonon confinement effects in diffusive quantum transport simulations with the effective mass approximation and k·p method
Submitted by grigby1 on Thu, 08/23/2018 - 10:59am
Logic gates
Transistors
Strain
Silicon
semiconductor device models
Resiliency
resilience
pubcrawl
privacy
phonons
phonon confinement effects
p-type silicon nanowire transistors
nanowires
n-type silicon nanowire transistors
advanced modeling tools
k·p method
elemental semiconductors
electron-phonon coupling
Electric potential
effective mass approximation
effective mass
dissipative quantum transport calculations
diffusive quantum transport simulations
cyber-physical systems
confinement
composability
Charge carrier processes
biblio
Reducing optical confinement losses for fast, efficient nanophotonic modulators
Submitted by grigby1 on Thu, 08/23/2018 - 10:59am
optical modulators
integrated optoelectronics
nanophotonic modulators
nanophotonics
optical confinement losses
Optical device fabrication
Optical films
optical losses
optical materials
optical modulation
Integrated optics
photonic integrated circuits
privacy
pubcrawl
resilience
Resiliency
Si
Silicon
ultracompact electroabsorption modulators
elemental semiconductors
cadmium compounds
carrier density
CdO
composability
confinement
confinement-related losses
cyber-physical systems
electro-optical modulation
Broadband communication
epsilon-near-zero confinement
field-effect carrier density tuning
high-mobility conducting oxides
high-mobility oxides
high-speed operation
High-speed optical techniques
In2O3-Si
indium compounds
biblio
Heterogeneous Malware Spread Process in Star Network
Submitted by grigby1 on Wed, 06/20/2018 - 11:50am
Malware Analysis
Steady-state
steady state infection
star network
SIS model
simulation
Silicon
Resiliency
resilience
pubcrawl
privacy
network theory (graphs)
Metrics
meta-stable state fraction
malware spread process
Analytical models
infected nodes
Human behavior
heterogeneous virus spread
heterogeneous SIS model
heterogeneous malware spread process
graph theory
finite size graph
extended N-intertwined model
epidemic threshold
Curing
computer viruses
Computational modeling
Artificial Neural Networks
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »