Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Phase measurement
biblio
A Survey on Advanced Schemes applied within Trusted Platform modules (TPM) and IaaS in cloud computing
Submitted by grigby1 on Thu, 08/04/2022 - 5:04pm
user interfaces
trusted platform modules
Software Levels. Cryptographic Techniques
Issues
Atmosphere
Phase measurement
Solids
IaaS
tpm
security
cloud computing security
composability
authorization
Cryptography
Resiliency
resilience
pubcrawl
biblio
Quantifying Geometric Measure of Entanglement of Multi-qubit Graph States on the IBM’s Quantum Computer
Submitted by grigby1 on Fri, 05/20/2022 - 4:32pm
Logic gates
Qubit
pubcrawl
Protocols
composability
Compositionality
Quantum entanglement
Phase measurement
geometric measure of entanglement
Metrology
multi-qubit graph states
quantum computer
quantum state
vertex degree
theoretical cryptography
biblio
A Text Similarity-based Protocol Parsing Scheme for Industrial Internet of Things
Submitted by grigby1 on Mon, 04/25/2022 - 3:23pm
tools
security
pubcrawl
resilience
Resiliency
Scalability
Protocols
Manuals
deep packet inspection
Position measurement
Phase measurement
Industrial Internet of Things
protocol parsing
Text similarity
biblio
An Analysis and Classification of Vulnerabilities in Web-Based Application Development
Submitted by grigby1 on Mon, 04/18/2022 - 2:37pm
application security
Companies
Complexity theory
Human behavior
Phase measurement
policy-based governance
pubcrawl
resilience
Resiliency
security
security weaknesses
Task Analysis
taxonomy
vulnerability classification
Web Application Security
Web application vulnerability
biblio
A Practical, Provably Unbreakable Approach to Physical Layer Security
Submitted by grigby1 on Fri, 06/19/2020 - 11:33am
reciprocal channel state
Phase measurement
Phase shift keying
phase shift keying constellation
physical layer security
provably unbreakable approach
PSK constellation points
pubcrawl
Radio frequency
radio frequency propagation path
radiowave propagation
raw key bits
multipath fading
resilience
Resiliency
secure key exchange
SNR
static fading channel
telecommunication security
Time measurement
under-determined system
wireless transmission
zero information leakage
independent channel realization
channel coding
channel perturbation
composability
Cryptography
error statistics
Eves antennas
Eves signal-to-noise ratio
fading channel
fading channels
FEC
forward error correction
antennas
independent realizations
key consolidation
key size
linear equations
masking property
measured reciprocal channel phase
Metrics
mirrors
modulo 2π
multipath channel
biblio
Locking Secret Data in the Vault Leveraging Fuzzy PUFs
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
physical unclonable functions
Human behavior
inherent sensitivity
locking secret data
low-cost security anchor
manufacturing variations
nanoscale variations
pattern locks
Phase measurement
helper data algorithm
prominent intrinsic PUF
Proposals
pubcrawl
Random access memory
Reliability
secret important data
secure environment
security scheme
enrollment phase
Resiliency
Metrics
Fuzzy Cryptography
aging sensitivity
Cryptography
data algorithms
DRAM chips
DRAM PUF
Scalability
error correction
error-correction algorithm
error-tolerant
fuzzy pattern
fuzzy PUF
fuzzy set theory
Hardware
biblio
Exploiting Phase Information in Thermal Scans for Stealthy Trojan Detection
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
modulation
weak thermal hot spots
Trojan horses
trojan horse detection
Trojan detection
thermal scans
Thermal Mapping
Temperature measurement
stealthy hardware Trojan detection
pubcrawl
Phase measurement
phase information
Phase
amplitude analysis
measurement platform
Lock-in Thermography
invasive software
integrated circuits
infrared thermography
infrared signals
infrared imaging
Heating systems
Hardware
formidable alternative
detection method
biblio
ERASMUS: Efficient remote attestation via self-measurement for unattended settings
Submitted by aekwall on Wed, 02/13/2019 - 11:59am
Phase measurement
composability
pubcrawl
Human behavior
Resiliency
untrusted remote device
unattended devices
Time measurement
software state
safety-critical applications
real-time systems
real-time devices
Radio frequency
RA techniques
Quality-of-Attestation
potentially expensive computation
Internet of Things
on-demand operation
mobile malware
mobile computing
invasive software
ERASMUS
embedded devices
efficient remote attestation
concrete technique
software integrity
security
Remote Attestation
malware
attestation
IoT devices
biblio
Bad data detection in PMU measurements using principal component analysis
Submitted by el_wehby on Mon, 05/14/2018 - 4:49pm
bad data detection
Current measurement
Frequency measurement
Monte Carlo methods
Monte Carlo simulation
Noise measurement
Phase measurement
phasor measurement
Phasor measurement units
PMU measurements
power system
principal component analysis
system response
Transmission line measurements
Voltage measurement
1544621
biblio
Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
Metrics
state estimation
Scalability
Resiliency
resilience
pubcrawl
power transmission control
power system state estimation
power grids
power grid state estimation
Phase measurement
phase angle measurements
optimization
Numerical models
AC power flow model
Mathematical model
load flow control
line failures detection problem
IEEE 300-bus systems
IEEE 118-bus systems
Human behavior
failure analysis
Cyber-physical attack
convex programming
convex optimization problem
Convex functions
Adversary Models