Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
delays
biblio
Hardware Trojan Detection Using Path Delay Order Encoding with Process Variation Tolerance
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
Logic gates
variation-tolerant path delay order encoding technique
Trojan horses
trojan horse detection
security threats
security
pubcrawl
process variation tolerance
path delay information
outsourcing
delays
HT detection techniques
Hardware Trojans
hardware Trojan detection
Hardware
Foundries
fabrication
encoding
DfT
design-for-trust techniques
biblio
Cyber-Physical System Checkpointing and Recovery
Submitted by grigby1 on Thu, 02/14/2019 - 11:23am
CPS resilience
checkpointing
cyber physical systems
cyber-physical systems
delays
Protocols
pubcrawl
recovery
resilience
Resiliency
security
Synchronization
System recovery
Task Analysis
biblio
Secure Scan Architecture Using Clock and Data Recovery Technique
Submitted by grigby1 on Thu, 02/14/2019 - 11:22am
fault coverage
Voltage control
System recovery
security threats
security of data
secure scan architecture
Scan Architecture
Resiliency
resilience
pubcrawl
Observability
Hardware Security
fault diagnosis
authentication
encoding
DLL
DfT technique
DfT
design for testability
delays
Controllability
computer architecture
Clocks
clock-data recovery technique
CDR
biblio
Performance Analysis of Elliptic Curves for Real-Time Video Encryption
Submitted by grigby1 on Fri, 02/08/2019 - 4:21pm
Jitter
Streaming media
security
Resiliency
resilience
Real-time video streaming
real-time systems
pubcrawl
Metrics
Asymmetric Encryption
Human behavior
encryption
Elliptic curve cryptography
ECC
delays
Compositionality
composability
biblio
PUF Modeling Attack using Active Learning
Submitted by grigby1 on Mon, 01/21/2019 - 12:39pm
learning efficiency
uncertainty
Training
state-of-the-art attacking methods
security
secure hardware systems
Scalability
Resiliency
PUF modeling attack
pubcrawl
physical unclonable function modeling attack
passive learning
Noise measurement
Metrics
active learning techniques
learning (artificial intelligence)
intelligent adversaries
Human behavior
hardware security techniques
hardware security field
Hardware
delays
Cryptography
CRP
Computational modeling
challenge-response pair
Adversary Models
adaptive adversaries
biblio
UFAP: Ultra-fast handoff authentication protocol for wireless mesh networks
Submitted by aekwall on Wed, 01/16/2019 - 2:06pm
mobile radio
wireless mesh networks
Wireless communication
Ultra-fast handoff authentication protocol
UFAP
trust-based
token-based authentication protocol
token-based
ticket-based
telecommunication security
Servers
resilience
pubcrawl
Protocols
mobility management (mobile radio)
authentication
mobile devices
Metrics
IEEE 802.11s
id-based
handoff authentication protocol
Handoff
extensible authentication protocol
EAP-TLS
EAP-PEAP
delays
Cryptography
Cryptographic Protocols
composability
Communication system security
biblio
Distributed Osmotic Computing Approach to Implementation of Explainable Predictive Deep Learning at Industrial IoT Network Edges with Real-Time Adaptive Wavelet Graphs
Submitted by grigby1 on Mon, 12/10/2018 - 11:41am
osmotic microservice
graph-based approach
IIoT network fog layer
IIoT systems
Industrial IoT
industrial IoT network edges
IoT development costs
large scale industrial Internet of Things
Logic gates
low-level machine language
LSTM networks
network cloud layer
graph theory
real-time
real-time adaptive wavelet graphs
real-time DSP
real-time graph-based Coiflet wavelets
real-time systems
system complexities
wavelet analysis
Wavelet Graph
wavelet transforms
XAI deep learning pre-processing applications
deep learning
Internet of Things
resilience
pubcrawl
Resiliency
Scalability
Hardware
xai
learning (artificial intelligence)
artificial intelligence deep learning problem
communication network noise
data quality
Cloud Computing
delay time
delays
digital signal processing chips
digital signal processor
distributed computing
distributed edge computing
distributed osmotic computing approach
distributed processing
edge layer
explainable artificial intelligence
biblio
Risk assessment of the supply chain: Approach based on analytic hierarchy process and group decision-making
Submitted by grigby1 on Mon, 12/03/2018 - 1:51pm
reduced weight function
turbulent economic environment
supply chains
supply chain risk assessment
supply chain management
Supply Chain
socio-economic effects
social environment
Scalability
risk management
Risk
Resiliency
resilience
analytic hierarchy process
pubcrawl
politics
political environment
multicriteria analysis
Metrics
group decision-making
group decision making
expert panel
evaluation
effective risk management systems
Economics
delays
biblio
RaptorQ code based concurrent transmissions in dual connectivity LTE network
Submitted by grigby1 on Fri, 10/26/2018 - 4:52pm
Resiliency
MeNB-UE
nonideal backhaul link
Out of order
out-of-order packet delivery problem
out-of-order problem
per-user throughput
pubcrawl
RaptorQ FEC code
master eNB
Scalability
secondary eNB
security
SeNB-UE links
source data
Throughput
user equipment
downlink U-plane data
3GPP specifications
associated MeNB
cellular radio
computer architecture
concurrent transmission scheme
concurrent transmissions
Decoding
delays
3G mobile communication
dual connectivity LTE network
encoded symbols
encoding
error correction codes
forward error correction
Long Term Evolution
Long Term Evolution network
biblio
Towards trustworthy data in networked control systems: A hardware-based approach
Submitted by grigby1 on Fri, 10/26/2018 - 4:52pm
malfunctioning systems
trustworthy data
transferred data needs
telecommunication security
smart factories
security
Scalability
Resiliency
pubcrawl
process control
networked control systems
Networked Control System
NCS
captured sensor data
Loss measurement
hardware-based approach
forward error correction
encryption
encrypted data
denial-of-service attacks
delays
Cryptography
correct functionality
controlled process
Communication channels
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »