Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
power consumption
biblio
Anomaly Detection in Smart Grids: A Survey From Cybersecurity Perspective
Submitted by grigby1 on Fri, 01/20/2023 - 12:30pm
smart meters
power consumption
energy theft
Soft sensors
Smart Grid Sensors
attack surface
renewable energy sources
Compositionality
Smart Grids
Predictive models
Smart Grid
Data models
Resiliency
resilience
Human Factors
pubcrawl
Anomaly Detection
feature extraction
biblio
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks
Submitted by grigby1 on Tue, 02/23/2021 - 2:55pm
security of data
performance-driven design
power consumption
Probes
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
SDN architectures
Network reconnaissance
security vulnerabilities
simplistic attack models
software defined networking
specific cache-like behaviors
Switches
target flow table
telecommunication security
underlying storage medium
data privacy
attack parameters
cache inference
cache storage
caching flow rules
communication bottleneck
computer network security
computer networks
control systems
adversarial reconnaissance
denial of service attack
distributed processing
easy target
flow table security
Government
intelligent attacks
Interference
IP networks
biblio
A New Side-Channel Vulnerability on Modern Computers by Exploiting Electromagnetic Emanations from the Power Management Unit
Submitted by grigby1 on Mon, 01/25/2021 - 11:30am
power consumption
Voltage regulators
voltage regulator module
Voltage control
Switches
side-channel vulnerability
side-channel
security of data
Resiliency
resilience
Regulators
Receivers
pubcrawl
power system management
Power Management.
power management unit
Air gaps
Phasor measurement units
modern microprocessors
modern computers
microprocessor chips
Microarchitecture Vulnerability
microarchitectural vulnerability
Metrics
Human Factors
Human behavior
electromagnetic-based side-channel
electromagnetic emanations
DVFS
computer power supplies
composability
Capacitors
biblio
A Graph Theory Approach towards IJTAG Security via Controlled Scan Chain Isolation
Submitted by grigby1 on Mon, 11/02/2020 - 12:28pm
Registers
IJTAG network
IJTAG security
Instruments
intellectual property security
isolation signals
microprocessor chips
on-chip access
on-chip instruments
policy-based governance
power consumption
pubcrawl
IJTAG
resilience
Resiliency
scan chain
security
security of data
system-on-chip
system-on-chip designs
third party intellectual property providers
unauthorized user access
untrusted sources
Diagnosis
Clocks
Complexity theory
composability
controlled scan chain isolation
data integrity
Data Integrity Attacks
data manipulation
data protection scheme
data sniffing
debug
design for test
authorisation
electronic design automation
embedded instruments
embedded systems
graph coloring problem
graph colouring
graph theory approach
hidden test-data registers
IEEE standards
IEEE Std 1687
IEEE Std. 1687
biblio
Dynamic Adaptation of Approximate Bit-width for CNNs based on Quantitative Error Resilience
Submitted by grigby1 on Tue, 10/06/2020 - 1:40pm
dynamic adaptation
Resiliency
resilience
quantitative error resilience
pubcrawl
Power demand
power consumption
power aware computing
Neurons
logic circuits
Hardware
error resilience
dynamic adaptation of approximate bit-width
adders
convolutional neural networks
convolutional neural network
convolutional neural nets
convolution
configurable adder
Computing Theory
CNNs
approximation theory
approximate computing technology
approximate computing
approximate bit-width
biblio
Wireless Self-Organizing Wi-Fi and Bluetooth based Network For Internet Of Things
Submitted by grigby1 on Fri, 09/04/2020 - 4:27pm
Bluetooth
bluetooth security
wireless self-organizing Wi-Fi
wireless LAN
Wi-Fi network
Wi-Fi
transmission channels
telecommunication power management
self-organizing networks
open standards
modems
energy-saving modes
energy conservation
Cyber Physical System
Internet of Things
power consumption
cyber physical systems
Wireless fidelity
Routing
wireless networks
wireless channels
Human behavior
resilience
Resiliency
composability
pubcrawl
Power demand
Switches
biblio
Autonomic Resource Management for Power, Performance, and Security in Cloud Environment
Submitted by aekwall on Mon, 08/24/2020 - 12:46pm
machine learning
Autonomic Security
secure resources
Power and Performance Management
on-demand computing capabilities
cloud computing systems
Big Data Analytics
autonomic resource management
Power demand
power consumption
High performance computing
security of data
tools
resource management
composability
pubcrawl
Resiliency
embedded systems
security
Hardware
Cloud Computing
Monitoring
biblio
Automated Synthesis of Differential Power Attack Resistant Integrated Circuits
Submitted by aekwall on Mon, 08/24/2020 - 12:41pm
Dynamic Differential Logic
cryptographic processors
cryptographic systems
differential circuit design
differential logic
Differential Power Analysis
differential power analysis attacks
differential power attack resistant integrated circuits
DPA attack resistance
DPA resistant cell designs
combinational cells
fully automated synthesis system DPA resistant integrated circuits
MDPL
multiplying circuits
RT level Verilog specifications
secret key information
Secure Differential Multiplexer Logic
sequential cells
sequential circuits
power consumption
Resiliency
pubcrawl
composability
Cryptography
standards
tools
Libraries
Automated Response Actions
Logic gates
private key cryptography
Power demand
logic design
Hardware Security
Resistance
combinational circuits
Automated Synthesis
CMOS logic circuits
CMOS synthesis
biblio
An Efficient Fault Detection Method for Elliptic Curve Scalar Multiplication Montgomery Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
Fault detection method
smaller keys
Scalability
Resiliency
resilience
public key cryptosystems
public key cryptography
pubcrawl
power consumption
Montgomery Scalar Multiplication algorithm
Montgomery ladder
Metrics
key sizes
Hardware
fault injection attack
fault diagnosis
Circuit faults
fault detection
Fault Attacks
embedded devices
Elliptical Curve Cryptography
Elliptic curves
elliptic curve Scalar Multiplication Montgomery algorithm
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
efficient fault detection method
efficient countermeasure
ECC
cryptographic computation
Conferences
classical asymmetric cryptosystems
biblio
Consideration of Security Attacks in the Design Space Exploration of Embedded Systems
Submitted by aekwall on Mon, 06/15/2020 - 10:55am
power consumption
security aware design space exploration framework
secure system designing
Secure IoT Systems
optimal design
Mixed Criticality Design Space Exploration
Embedded System Design
door access system use case
Design Process
behavioral security attack description
architectural security attack description
IoT system
Power demand
Space exploration
security requirements
security of data
security measures
tools
internet
Metrics
security attacks
composability
pubcrawl
Resiliency
cyber security
Bayes methods
embedded systems
Task Analysis
Internet of Things
Computer crime
1
2
3
4
5
next ›
last »