Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Power demand
biblio
Side-Channel Analysis for Searchable Encryption System and Its Security Evaluation
Submitted by grigby1 on Mon, 03/02/2020 - 1:33pm
Indexes
Tamper resistance
side-channel analysis
side channel attack
Security Evaluation
searchable encryption system
Scalability
pubcrawl
Power demand
power analysis
Metrics
Medical services
medical computing
searchable encryption
Immune system
illegal attacks
Human Factors
Human behavior
Hamming distance
encryption
embedded searchable encryption
Cryptography
Ciphers
Big Data
Artificial Intelligence
biblio
Countermeasure of Lightweight Physical Unclonable Function Against Side-Channel Attack
Submitted by grigby1 on Mon, 03/02/2020 - 1:32pm
message authentication
Training data
Tamper resistance
side-channel information
Side-channel attack
security of IoT
Scalability
pubcrawl
Power measurement
Power demand
power consumption
power aware computing
Physical Unclonable Function
modeling attack
Metrics
authentication
lightweight PUF
lightweight physical unclonable function
Internet of Things
internet
Integrated circuit modeling
Industrial Internet of Things
Human Factors
Human behavior
Hardware Security
field programmable gate arrays
external Internet
Cryptography
countermeasure method
biblio
Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection
Submitted by grigby1 on Wed, 02/26/2020 - 4:38pm
pubcrawl
logic locking method
malicious circuits
million-gate circuits
outsourcing
PCA-based HT detection methods
power analysis-based Trojan detection
power consumption
power consumption analysis
Power demand
principal component analysis
Process Variations
logic locking
resilience
security
semiconductor companies
small sub-circuit collection
supply chain security
Switches
system-on-chip
trojan horse detection
Trojan horses
untrustworthy fabs
hardware Trojan detection
policy-based governance
composability
IP piracy
circuit block extraction
circuit power
cyber physical systems
design for hardware trust
fabrication foundries
gate level
Hardware
Hardware Security
Resiliency
hardware Trojan threat
HT activity
HT power
HT-infected circuits
industrial property
integrated circuit layout
intellectual properties
invasive software
IPS
Logic gates
biblio
Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack
Submitted by aekwall on Mon, 02/17/2020 - 2:16pm
Smart Grid
smart grid technology
smart electric meter
remote monitoring
electric power companies
data collection Integrity
cyber-attack conditions
cyber attack
smart meter
power meters
Meters
Power demand
cyber physical systems
smart meters
cyberattack
power system security
Smart Grids
power engineering computing
smart grid security
smart power grids
Metrics
privacy
pubcrawl
Resiliency
cyber security
data integrity
Scalability
security of data
biblio
Hybrid AC/DC Microgrid Configurations for a Net-Zero Energy Community
Submitted by aekwall on Mon, 01/20/2020 - 11:47am
interface converters
system reliability
Resiliency
Reliability
pubcrawl
power sharing issues
power generation reliability
Power demand
power convertors
net-zero energy community
Microgrids
Medium voltage
load shedding
alternating current microgrids
Integrated circuit interconnections
Hybrid AC/DC microgrid
hybrid AC-DC microgrid
expandability
distributed power generation
direct current microgrids
costly medium-voltage components
Configurations
composability
circuit breakers
Buildings
biblio
Variation-Aware Hardware Trojan Detection through Power Side-Channel
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
integrated logic circuits
variation-aware hardware Trojan detection
Trojan-to-circuit power consumption
Trojan horses
trojan horse detection
side-channel analysis
Sensitivity
pubcrawl
process variation
power side-channel
Power demand
outsourcing
logic design
invasive software
Clock-tree Partition
integrated circuits
integrated circuit testing
HT detection sensitivity
HT activation chances
hardware trojan
Hardware
fine-grain circuit partitioning
Equal-power Partition
Detection sensitivity
Detectability
Cryptography
Clocks
biblio
A Neural Network Trojan Detection Method Based on Particle Swarm Optimization
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
particle swarm optimization
Trojan horses
trojan horse detection
Side Channel Analysis technology
RTL circuits
pubcrawl
PSO NN method
Principal Component Analysis algorithm
principal component analysis
Power demand
power consumption data
power consumption
power aware computing
Artificial Neural Networks
particle swarm optimisation
neural network Trojan detection
neural nets
malicious modifications
invasive software
intelligent neural networks algorithm
Integrated circuit modeling
HSPICE power consumption simulation
hardware Trojan detection
Hardware
Cryptography
biblio
A software-defined networking framework for IoT based on 6LoWPAN
Submitted by grigby1 on Wed, 01/16/2019 - 2:25pm
pubcrawl
wireless sensor networks
Wireless Sensor Network
Wireless communication
telecommunication power management
Task Analysis
software-defined wireless management
software-defined networking
software defined networking
SD-WSN6Lo
Resiliency
Random access memory
6LoWPAN
Protocols
Power demand
power consumption
personal area networks
networking framework
management complexity
low power wireless network
IoT
Internet of Things
composability
6LoWPAN networks
biblio
Improving existing 6LoWPAN RPL for content based routing
Submitted by grigby1 on Wed, 01/16/2019 - 2:25pm
Reliability
low-power wireless personal area network
operating systems
operating systems (computers)
packet delivery ratio
personal area networks
power consumption
Power demand
pubcrawl
Linear programming
Resiliency
Routing
routing protocol for low power and lossy network
Routing protocols
sensor networks
telecommunication traffic
Traffic congestion
cooja
6LoWPAN RPL
CBR technique
composability
computer network reliability
Conferences
content based routing
content based routing technique
contiki operating system
6LoWPAN
cooja simulator.
data aggregation
data aggregation ratio
energy consumption
Energy Efficiency
home automation
Internet of Things
biblio
HIDE: AP-Assisted Broadcast Traffic Management to Save Smartphone Energy
Submitted by el_wehby on Fri, 05/25/2018 - 3:47pm
Power demand
wireless LAN
WiFi energy consumption
WiFi broadcast frames
Unicast
trace-driven simulation
telecommunication traffic
telecommunication power management
suspend mode
smartphone energy saving
smart phones
Protocols
AP-assisted broadcast traffic management
Ports (Computers)
packet round-trip time
Nexus One
network capacity
IEEE 802.11 Standard
high power active mode
HIDE system
energy consumption
energy conservation
computer network management
Central Processing Unit
1536086
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »