Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Trojan horses
biblio
Sandbox Integrated Gateway for the Discovery of Cybersecurity Vulnerabilities
Submitted by grigby1 on Fri, 02/17/2023 - 5:11pm
Phishing
email server
Email gateway
policy governance
sandbox
sandboxing
malware
Telecommunications
Electronic mail
Logic gates
Trojan horses
composability
pubcrawl
Servers
Organizations
Engines
collaboration
biblio
Runtime Detection of Time-Delay Security Attack in System-an-Chip
Submitted by aekwall on Fri, 02/17/2023 - 10:44am
Trojan horses
Hardware
quality of service
real-time systems
pubcrawl
Resiliency
Power demand
Predictive Metrics
Runtime
System performance
Router Systems Security
Hardware Trojan (HT)
Network-on-Chip (NoC)
System-on-Chip(SoC)
biblio
A Cautionary Note on Protecting Xilinx’ UltraScale(+) Bitstream Encryption and Authentication Engine
Submitted by aekwall on Fri, 01/20/2023 - 4:10pm
security
IP networks
Trojan horses
Hardware
authentication
Scalability
encryption
pubcrawl
Resiliency
Object recognition
signature based defense
biblio
CleaNN: Accelerated Trojan Shield for Embedded Neural Networks
Submitted by grigby1 on Tue, 11/08/2022 - 11:51am
Training
Anomaly Detection
pubcrawl
resilience
Resiliency
Trojan horses
deep learning
Image reconstruction
discrete cosine transforms
Transforms
image restoration
embedded systems
sparse recovery
Trojan Attack
neural network resiliency
biblio
Sensing with Random Encoding for Enhanced Security in Embedded Systems
Submitted by grigby1 on Fri, 09/30/2022 - 3:56pm
Hardware Security
random sensing
random encoding
ios
iOS Security
telemetry
Resiliency
Satellites
hardware trojan
timing
security
Compositionality
Trojan horses
encoding
sensors
resilience
Metrics
Human Factors
pubcrawl
biblio
Phishing Attacks and Protection Against Them
Submitted by grigby1 on Tue, 07/12/2022 - 3:10pm
Phishing
Trojans
malicious PDF-files
bankers
cryptojacking
Ransomware
Writing
social engineering
Electronic mail
pubcrawl
password
resilience
Metrics
Trojan horses
Software
Resiliency
Human behavior
biblio
Hardware Trojan for Lightweight Cryptoraphy Elephant
Submitted by aekwall on Thu, 05/19/2022 - 1:42pm
Cryptography
Trojan horses
Hardware
Human Factors
Conferences
pubcrawl
Scalability
Metrics
Resistance
hardware trojan
Hardware Security
Consumer electronics
Elephant
lightweight cryptography
Tamper resistance
biblio
Deep Learning Based Approach for Hardware Trojan Detection
Submitted by grigby1 on Thu, 05/19/2022 - 1:04pm
deep learning
Neural networks
pubcrawl
resilience
Resiliency
Hardware
Analytical models
composability
Trojan horses
Hardware Trojans
Transistors
Distance measurement
Non-Invasive approach
outlier detection
trojan horse detection
biblio
Low-overhead Solutions For Preventing Information Leakage Due To Hardware Trojan Horses
Submitted by grigby1 on Thu, 05/19/2022 - 1:03pm
Trojan horses
trojan horse detection
Information Leakage
CRC
mac
Microprocessors
Cyclones
Hardware Trojans
resource management
encryption
Runtime
composability
Hardware
FPGA
Resiliency
resilience
pubcrawl
biblio
A Stealthy Hardware Trojan Design and Corresponding Detection Method
Submitted by grigby1 on Thu, 05/19/2022 - 1:03pm
Hardware Security
trojan horse detection
imbalanced controllability
Observability
unsupervised clustering
Controllability
transition probability
Systematics
Hardware Trojans
pubcrawl
Trojan horses
Benchmark testing
composability
Integrated circuit modeling
Hardware
Resiliency
resilience
1
2
3
4
5
6
7
8
9
…
next ›
last »