Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
integrated circuits
biblio
Routing Aware and Runtime Detection for Infected Network-on-Chip Routers
Submitted by
grigby1
on Mon, 11/04/2019 - 11:39am
Hardware
hardware trojan
integrated circuits
invasive software
logic design
malicious Hardware Trojans
Malicious-tolerant Routing Algorithm
Metrics
MPSoC
multiprocessing systems
Multiprocessors System-on-Chip
network routing
network-on-chip
network-on-chip architecture
NoC
outsourcing
pubcrawl
resilience
Resiliency
Router Systems Security
Routing
Runtime
runtime detection
secret key leaking
secure routing algorithm
security
security attacks
System recovery
system-on-chip
Trojan horses
biblio
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones
Submitted by
grigby1
on Wed, 10/30/2019 - 9:52am
computer network security
DNS
DNSsec
DNSSEC-signed IPv6 reverse zones
integrated circuits
internet
Internet of Things
Internet of Things devices
Internet-connected devices
internet-wide scans
IP networks
IPv4 hosts
IPv6
IPv6 address space
IPv6 hosts
large-scale security scans
Licenses
Network reconnaissance
network scanning
principal component analysis
privacy
pubcrawl
resilience
Resiliency
Revere DNS (rDNS)
RNA
Scalability
security
Security by Default
sensitive data exposure
unintended IPv6 connectivity
ZMap
biblio
Improvement of Security System Level in the Cyber-Physical Systems (CPS) Architecture
Submitted by
grigby1
on Wed, 09/11/2019 - 1:43pm
Cloud Computing
cloud computing technology
composability
Computational modeling
computer architecture
computer elements
CPS
CPS architecture
cyber-physical systems
Detectors
Industry 4.0
information security
integrated circuits
Internet of Things
IoT
Metrics
Microelectronics
Microelectronics Security
node information
physical entities
production engineering computing
pubcrawl
resilience
Resiliency
SCCAF
security
security framework
security of data
security system level
Smart CCAF
smart cloud computing adoption framework
biblio
Architectural Security Weaknesses in Industrial Control Systems (ICS) an Empirical Study Based on Disclosed Software Vulnerabilities
Submitted by
aekwall
on Mon, 08/26/2019 - 9:07am
architectural root cause
authorisation
common architectural security weaknesses
common security architectural weaknesses
component-based architectures
computer architecture
control systems
data acquisition
Data mining
disclosed software vulnerabilities
Human behavior
Human Factors
human-machine interfaces
ICS systems
improper input validation
industrial automation
industrial control
Industrial Control Systems
integrated circuits
internet
Metrics
PLC
policy-based governance
pubcrawl
resilience
SCADA configuration
SCADA systems
security
security of data
security weaknesses
Software
supervisory control
biblio
On the Feasibility of Generating Deception Environments for Industrial Control Systems
Submitted by
aekwall
on Mon, 07/01/2019 - 9:10am
composability
computer network security
constantly morphing surface
critical infrastructure environments
critical infrastructures
critical physical processes
cyber defenders
cyber defense
cyber security
cyber threat landscape
data acquisition
data acquisition systems
deception
generating deception environments
Human behavior
ICs
ICS networks
industrial control
Industrial Control Systems
integrated circuits
networked computer systems
operational ICS
proactive threat intelligence
pubcrawl
Resiliency
SCADA
SCADA systems
SCADA Systems Security
security of data
supervisory control-and-data acquisition systems
threat intelligence
tools
Virtualization
biblio
Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening
Submitted by
willirn1
on Thu, 05/30/2019 - 3:04pm
actuators
control
critical infrastructures
cyber physical systems
cyber-attacks
cyber-security risks
IIoT system security
Industrial Internet of Things
industrial platforms
integrated circuits
Internet of Things
Investment
production engineering computing
Redundancy
resilience
resilient IIoT systems
security
security economics
security of data
Transportation
Vanderbilt
biblio
Resilient Distributed Diffusion for Multi-task Estimation
Submitted by
willirn1
on Thu, 05/30/2019 - 2:00pm
internet
Vanderbilt
Internet of Things
learning (artificial intelligence)
Protocols
wireless sensor networks
social networking (online)
Data mining
Bluetooth
mobile robots
wireless channels
estimation
resilience
integrated circuits
Distributed databases
Adaptation models
Degradation
Task Analysis
Resilient diffusion
multitask estimation
biblio
Hardware-Based Memory Acquisition Procedure for Digital Investigations of Security Incidents in Industrial Control Systems
Submitted by
grigby1
on Thu, 05/09/2019 - 9:47am
attacked computer
comprehensive solutions
computer security
continuous monitoring systems
control engineering computing
data collection procedure
digital investigations
forensic
guaranteed reliability
hardware-based memory acquisition procedure
ICs
industrial control
Industrial Control Systems
information security
integrated circuits
invasive software
malicious software functions
malware
memory contents collecting
operating system
operating systems
operating systems (computers)
production engineering computing
pubcrawl
Reliability
reliable code
resilience
Resiliency
resulting contents
Scalability
scalable
security incidents
software methods
volatile memory
biblio
The Urgency of the Threats of Attacks on Interfaces and Field-Layer Protocols in Industrial Control Systems
Submitted by
grigby1
on Thu, 05/09/2019 - 9:46am
Current loop
Current measurement
HART-protocol
industrial control
industrial control system
industrial control system field layer
industrial control system information security
Industrial Control Systems
information security systems
integrated circuits
process control
Protocols
pubcrawl
resilience
Resiliency
Scalability
scalable
security of data
sensors
biblio
Research of Industrial Control System Device Firmware Vulnerability Mining Technology Based on Taint Analysis
Submitted by
grigby1
on Thu, 05/09/2019 - 9:46am
component
Data mining
device firmware
firmware
fuzzing test
Hardware
industrial control
industrial control system
industrial control system device firmware vulnerability mining technology
Industrial Control Systems
integrated circuits
Microprogramming
program testing
pubcrawl
resilience
Resiliency
Scalability
scalable
security
security of data
Software
taint analysis
taint analysis technology
test efficiency
vulnerability mining
1
2
3
4
5
6
next ›
last »