Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Supply Chain
biblio
Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory
Submitted by aekwall on Mon, 03/29/2021 - 11:51am
Scalability
game theory
invasive software
deception
learning (artificial intelligence)
Resiliency
pubcrawl
Supply Chain
supply chains
Cybersecurity
Human Factors
Predictive Metrics
game theoretic security
integrated circuits
hypergame theory
Repeated game
actual game stage
deception analysis
first-step deception mitigation process
hardware Trojan detection
Hardware Trojans
IC designers
learning stage
malicious IC manufacturer
manufactured ICs
multilevel game-theoretic framework
offshore manufacturing
optimal deception rationality
prospect theory
third-party companies
zero-sum
biblio
An Analysis of Pre-installed Android Software
Submitted by grigby1 on Tue, 02/23/2021 - 2:24pm
Android (operating system)
Android devices
Android ecosystem
Android OS
Android's open source model
Androids
composability
Computer crime
crowd-sourcing methods
data privacy
data-driven services
device manufacturers
device vendors
Ecosystems
Humanoid robots
internet
Libraries
Metrics
Microprogramming
mobile computing
mobile network operators
network accountability
open-source nature
potentially harmful behavior
potentially invasive private data collection practices
pre-installed Android software
pre-installed software
preinstalled apps
preinstalled software
privacy implications
product differentiation
pubcrawl
real-world Android firmware
resilience
Resiliency
security
sensitive data
smart phones
social network platforms
social networking (online)
Software
Supply Chain
tracking services
unwanted behavior
biblio
An Orthogonal Algorithm for Key Management in Hardware Obfuscation
Submitted by grigby1 on Mon, 11/02/2020 - 12:28pm
authenticate obfuscation keys
composability
copy protection
Hardware
Hardware Security
industrial property
integrated circuit design
integrated circuits
intellectual property piracy attacks
intellectual property security
IP cores
IP networks
IP piracy
IP piracy attacks
Licenses
member leakage attack
microprocessor chips
orthogonal matrix
Orthogonal obfuscation
orthogonal obfuscation algorithm
partnership organization
policy-based governance
Protocols
pubcrawl
resilience
Resiliency
reverse engineering
security
semiconductor chips
Supply Chain
supply chain management
biblio
Vulnerability Modelling for Hybrid IT Systems
Submitted by grigby1 on Tue, 10/06/2020 - 1:50pm
actual vulnerabilities
attack paths
Australia
Common Vulnerability Scoring System
Complexity theory
computer network security
Computing Theory
critical nodes
CVSS
CVSS v3 framework
CVSSIoT
embedded systems
improved vulnerability scoring system
industry standard
Internet of Things
IoT
IoT devices
IoT embedded networks
IoT systems
Measurement
Metrics
national vulnerability database
network topology
pubcrawl
realistic IT supply chain system
Safety
security
Security Metrics
Supply Chain
Topology
traditional computer systems
traditional IT security models
Vulnerability
Vulnerability Evaluation
vulnerability modelling
biblio
Special Session: Countering IP Security Threats in Supply Chain
Submitted by grigby1 on Thu, 03/12/2020 - 12:09pm
Data models
electronic engineering computing
Human behavior
integrated circuit design
integrated circuit fabrication
integrated circuit manufacture
integrated circuit technology
integrated circuits
internet
invasive software
IP security threats
learning (artificial intelligence)
learning-based trust verification
logic design
logic locking schemes
machine learning
Monitoring
production engineering computing
Protocols
pubcrawl
resilience
Resiliency
reverse engineering
Scalability
Supply Chain
supply chain management
supply chain security
tagging
telecommunication security
Training
Trojan insertion
Valves
biblio
Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace
Submitted by aekwall on Mon, 02/24/2020 - 10:56am
IoT
Monitoring
Internet of Things
cyber-physical systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
Supply Chain
organisational aspects
Anomaly Detection
Digital Forensics
cryptocurrencies
Bluetooth
Insider Threats
business data processing
Threat Landscape
Artificial Intelligence
CPS
non-repudiation
authenticity
behavioural patterns
Bluetooth-based proximity monitoring solution
businesses
chain-of-custody
complexities
cyber-physical objects
data collection capabilities
defence-in-depth strategy
Digital Witness
digital witnesses
DW
emerging concept
empirical data
employees
federated blockchain model
federated blockchain-based tracking
forensic-readiness
Incident Response
Insider threart
liability attribution framework
modern digital forensics
object behaviour
operational efficiency
proactive insider threat detection
Process Automation
real-life case study
SCBE
security-by-design framework
smart building
Smart City
smart controlled business environments
smart SPS objects
smart workplace
systematic integration
Repudiation
biblio
Does the NIS implementation strategy effectively address cyber security risks in the UK?
Submitted by aekwall on Mon, 02/17/2020 - 2:28pm
IoT
security of data
Computer crime
Scalability
cyber security
Resiliency
pubcrawl
Metrics
Supply Chain
risk management
cyber-physical security
Standards organizations
cyber attack
Security Risk Management
CA
CNI
CNI sectors
collaborative implementation approach
connected smart technology implementations
critical national infrastructure
cross-sector CNI service security measures
cyber risk management
cyber security risks
cyber spaces
cyber-risk management capabilities
cyber-security risk management capabilities
DSP
IGP
legislation
national framework
NCSC
network and information security
NIS
NIS directive
NIS framework
NIS implementation
NIS implementation strategy
NIS key strategic objectives
NIS objectives
noncyber elements
OES
Regulation
Smart City
UK Critical National Infrastructure sectors
biblio
Assessing the Security Risks of Multicloud SaaS Applications: A Real-World Case Study
Submitted by grigby1 on Mon, 01/27/2020 - 12:33pm
Analytical models
case study
cloud
Cloud Computing
cloud computing services
cloud risks
cloud service providers
cloud supply chain cyber risk assessment model
collaboration
composability
computing industry
CSCCRA model
data privacy
dynamic supply chain
Human behavior
Human Factors
Metrics
multicloud SaaS application
policy-based governance
privacy concerns
pubcrawl
Quantitative risk assessment
resilience
Resiliency
risk assessments
risk management
SaaS
Scalability
security
security risks
Software as a service
Supply Chain
supply chain risk assessment
supply chain-inclusive risk assessment model
supply chains
transparency
biblio
Blockchain-Based Mutual Authentication Security Protocol for Distributed RFID Systems
Submitted by grigby1 on Wed, 10/02/2019 - 3:03pm
access control system
authentication
authorisation
blockchain
blockchain-based mutual authentication security protocol
Computers
credit card
Cryptographic Protocols
distributed environment
distributed RFID systems
distributed system
high security demand
Human behavior
Human Factors
identity related information
potential attacks
privacy
Protocols
pubcrawl
radio frequency identification technology
radiofrequency identification
resilience
Resiliency
RFID
RFIDs
security
Servers
SQL
SQL injection attack
Supply Chain
biblio
Determining a Security Roadmap for the Microelectronics Industry
Submitted by grigby1 on Wed, 09/11/2019 - 2:43pm
advanced process control efforts
Big Data
big data explosion
Cloud Computing
cloud-based solutions
composability
data sharing
data systems
electronic equipment manufacture
electronics industry
industrial property
Industry 4.0
industry-wide standards
information security
International Roadmap for Devices and System Factory Integration International Focus Team
IP networks
IP security
IRDS FI IFT
manufacturing
Metrics
Microelectronics
microelectronics manufacturing industry
Microelectronics Security
microfabrication
process control
production engineering computing
pubcrawl
resilience
Resiliency
security
security maintenance
security of data
security technology roadmap
smart manufacturing
standards
Supply Chain
supply chain management
technological forecasting
1
2
3
4
next ›
last »