Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Power measurement
biblio
A light-weight hardware/software co-design for pairing-based cryptography with low power and energy consumption
Submitted by grigby1 on Wed, 05/16/2018 - 1:47pm
public key cryptography
Metrics
Montgomery multiplier
multiplying circuits
open-source software PBC implementation
optimal Ate pairing
Pairing based cryptography
pairing-based cryptography
PKC
Power measurement
pubcrawl
low-power electronics
public-key cryptography
Repudiation
resilience
Resiliency
sensors
simple power analysis
Software
system-on-chip
Zynq-7020 SoC
embedded electronic devices
Barreto-Naehrig curves
circuit optimisation
Clocks
composability
cryptographic services
cryptographic system
Cryptography
Differential Power Analysis
ECC
embedded
ARM Cortex A9 processor
energy consumption
field programmable gate arrays
Hardware
hardware-software co-design
hardware-software codesign
Human behavior
human factor
light-weight hardware/software co-design
lightweight devices
biblio
Real-Time Identification of Dynamic Events in Power Systems Using PMU Data, and Potential Applications #8212;Models, Promises, and Challenges
Submitted by el_wehby on Mon, 05/14/2018 - 2:23pm
Power system dynamics
Voltage measurement
transmission systems
Switches
situational awareness
real-time identification
power transmission protection
power systems
power system stability
power system security
power system protection security
classification
Power measurement
PMU data
Phasor measurement units
phasor measurement
pattern creation
dynamic events
Data visualization
data communications
cyberattack
1549831
biblio
State Estimation Error Detection System for Online Dynamic Security Assessment
Submitted by grigby1 on Wed, 05/09/2018 - 2:50pm
Resiliency
power system monitoring
power system security
power system stability control
power system state estimation
power system transient stability
pubcrawl
Q measurement
remedial action schemes
resilience
power system
SCADA
SCADA systems
SE error detection system
security
state estimation
state estimation error detection system
supervisory control and data acquisition
Transient Stability
load shedding
DSA analysis
DSA assessment
Dynamic security assessment
dynamical system
electrical power system
generator shedding scheme
Human behavior
Hybrid power systems
Load flow
Compositionality
online dynamic security assessment
online-DSA
phasor measurement
Phasor measurement units
Phasor Measurements Units
PMU observation data
power flow value
Power measurement
biblio
Intra-Die-Variation-Aware Side Channel Analysis for Hardware Trojan Detection
Submitted by grigby1 on Wed, 04/11/2018 - 2:59pm
Sensitivity
logic testing
Power based Side-channel
Power measurement
probability
process variation levels
Process Variations
pubcrawl
relative power difference
resilience
Resiliency
logic circuits
sequential type Trojans
side channel analysis
spatial correlation
Systematics
test pattern generation
Trojan activation probability
trojan horse detection
Trojan horses
Trojan inserted circuits
hardware trojan
automatic test pattern generation
combinational type Trojans
composability
cyber physical systems
delays
Detection sensitivity
efficient Trojan detection approach
elevated process variations
Hardware
AES-128 circuit
hardware Trojan detection
high detection sensitivity
integrated circuit design
integrated circuit testing
integrated circuits
intra-die-variation
invasive software
ISCAS 89 benchmark
ITC 99 benchmark
biblio
Hardware malicious circuit identification using self referencing approach
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
post-silicon testing
Trojan horses
testing
Test vector generation
Temporal Self Referencing
side channel analysis
sequential Trojans
Sequential trojan
self referencing approach
security vulnerabilities
Robust Trojans
Resiliency
resilience
pubcrawl
Power measurement
composability
Payloads
outsourced products
Microelectronic Security
Metrics
malicious inclusions
logic testing
leakage power
invasive software
hardware Trojan detection sensitivity
hardware malicious circuit identification
Hardware
delays
Cryptography
biblio
Melody: Synthesized datasets for evaluating intrusion detection systems for the smart grid
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
emulation
Intrusion Detection
Power measurement
process control
pubcrawl
Scalability
scalable
Scalable Security
security
Smart Grids
Topology
Training
biblio
Dr. WATTson: Lightweight current-based Intrusion Detection (CBID)
Submitted by grigby1 on Mon, 11/20/2017 - 12:28pm
internet
Voltage measurement
Voltage Characteristics
Tamper-Resistance
Tamper resistance
SCADA systems
SCADA
Resiliency
resilience
pubcrawl
Power measurement
lightweight current-based intrusion detection
lightweight current-based IDS
knowledge-based detection
Intrusion Detection
batteries
integrated circuits
Industrial Control Systems
industrial control
IDS
ICs
false alarm rate
Dr. WATTson
Data Breach
Current measurement
Current Drain Intrusion Detection
computer network security
composability
CBID
behavior-based detection
biblio
"Bit-Level Differential Power Analysis Attack on Implementations of Advanced Encryption Standard Software Running Inside a PIC18F2420 Microcontroller"
Submitted by grigby1 on Thu, 02/23/2017 - 12:52pm
Mathematical model
side channel attacks
pubcrawl170105
Power measurement
Power demand
Power Attacks
PIC18F2420 microcontroller
microcontrollers
microcontroller security
microcontroller privacy
microcontroller
advanced encryption standard software
encryption
Differential Power Analysis
Data protection
data integrity
data confidentiality
Cryptography
cryptographic algorithms
bit-level differential power analysis attack
AES
biblio
"Side channel power analysis of an AES-256 bootloader"
Submitted by grigby1 on Tue, 02/14/2017 - 12:57pm
Hamming weight
Synchronization
side channel power analysis
side channel attacks
secure bootloader
SCA
pubcrawl170102
power measurements
Power measurement
microcontrollers
initialization vector
AES-256 bootloader
firmware files
Entropy
encryption
Cryptography
cryptographic algorithms
CPA attack
correlation power analysis
Correlation
AES-256-CBC
biblio
Real-time trust evaluation in integrated circuits
Submitted by BrandonB on Wed, 05/06/2015 - 11:37am
power-gating techniques
Trojan-infected variants
Trojan-free variants
Trojan horses
testing
statistical analysis
side-channel measurements
side-channel fingerprinting detection
shift registers
Semiconductor device measurement
reconfigurable linear feedback shift register array
real-time trust evaluation framework
advanced design skills
Power measurement
Power demand
post-fabrication trust evaluation methods
on-board global power consumption
LFSR array
invasive software
integrated circuits
hardware Trojan detection
Hardware
Erbium
chip trustworthiness
« first
‹ previous
1
2
3
4
5
6
next ›
last »