Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Power demand
biblio
Security Comparison between Dynamic Static WSN for 5g Networks
Submitted by grigby1 on Mon, 03/05/2018 - 12:11pm
Power demand
WSN
wireless sensor networks
vehicle dynamics
Static Network
security
Resiliency
resilience
pubcrawl
5G
power consumption
Monitoring
Metrics
energy consumption
dynamic networks
Dynamic Network
composability
5G mobile communication
biblio
Security Comparison between Dynamic Static WSN for 5g Networks
Submitted by grigby1 on Mon, 03/05/2018 - 12:10pm
Power demand
WSN
wireless sensor networks
vehicle dynamics
Static Network
security
Resiliency
resilience
pubcrawl
5G
power consumption
Monitoring
Metrics
energy consumption
dynamic networks
Dynamic Network
composability
5G mobile communication
biblio
Fully integrable current-mode feedback suppressor as an analog countermeasure against CPA attacks in 40nm CMOS technology
Submitted by grigby1 on Wed, 02/21/2018 - 12:41pm
Power demand
Logic gates
Metrics
Microelectronic Security
MTD improvement
on-chip analog-level CPA countermeasure
Power Analysis Attack
power aware computing
power consumption
IoT
pubcrawl
resilience
Resiliency
sensible data security
side channel attack
size 40 nm
system-on-chip
ultraconstrained IoT smart devices
CPA
circuit feedback
CMOS
CMOS analogue integrated circuits
CMOS logic circuits
CMOS technology
composability
correlation coefficient
correlation power analysis
Analog-level
CPA attacks
CPA-resistant cryptographic devices
Cryptography
current-mode
current-mode circuits
data-dependency
fully integrable current-mode feedback suppressor
Internet of Things
biblio
Security threat identification using energy points
Submitted by grigby1 on Mon, 12/04/2017 - 11:58am
pubcrawl
software engineering
software development lifecycle
Software
security threat identification
security process
security of data
security mechanisms
security breaches
SDLC
Scientific Computing Security
Resiliency
Central Processing Unit
Power demand
power aware computing
Metrics
energy points
energy consumption
energy based denial of service attacks
DoS attack
cosmic Method
Computers
Computer crime
Compositionality
biblio
Trends on EDA for low power
Submitted by grigby1 on Wed, 03/08/2017 - 12:54pm
state-of-the-art microprocessors
low-power electronics
microprocessor chips
optimization
Physical design
power consumption
Power demand
power optimization
pubcrawl170110
Low power
transistor circuits
transistor layout
transistor network
transistor sizing
Transistors
visualization
visualization tools
AD 2012
Logic gates
Libraries
layout design automation tool
Layout
ISPD Contest
integrated circuit layout
electronic design automation
EDA algorithms
EDA
discrete gate sizing
continuous gate sizing
cell library
Algorithms
Algorithm design and analysis
AD 2013
biblio
"Bit-Level Differential Power Analysis Attack on Implementations of Advanced Encryption Standard Software Running Inside a PIC18F2420 Microcontroller"
Submitted by grigby1 on Thu, 02/23/2017 - 11:52am
Mathematical model
side channel attacks
pubcrawl170105
Power measurement
Power demand
Power Attacks
PIC18F2420 microcontroller
microcontrollers
microcontroller security
microcontroller privacy
microcontroller
advanced encryption standard software
encryption
Differential Power Analysis
Data protection
data integrity
data confidentiality
Cryptography
cryptographic algorithms
bit-level differential power analysis attack
AES
biblio
"Survey on Clean Slate Cellular-IoT Standard Proposals"
Submitted by grigby1 on Tue, 02/21/2017 - 10:52am
Low Power Wide Area
system level evaluation
pubcrawl170103
Protocols
Proposals
Power demand
power aware computing
modulation
LPWA technologies
low power-wide area network technologies
C-IoT
Internet of Things Standards
Internet of Things
GSM
Evaluation of C-IoT
clean slate technology
Clean Slate Proposals
clean slate cellular-IoT standard proposals
cellular Internet of Things
cellular automata
biblio
"Survey on Clean Slate Cellular-IoT Standard Proposals"
Submitted by grigby1 on Tue, 02/21/2017 - 10:49am
Low Power Wide Area
system level evaluation
pubcrawl170103
Protocols
Proposals
Power demand
power aware computing
modulation
LPWA technologies
low power-wide area network technologies
C-IoT
Internet of Things Standards
Internet of Things
GSM
Evaluation of C-IoT
clean slate technology
Clean Slate Proposals
clean slate cellular-IoT standard proposals
cellular Internet of Things
cellular automata
biblio
High-Throughput and Memory-Efficient Multimatch Packet Classification Based on Distributed and Pipelined Hash Tables
Submitted by BrandonB on Wed, 05/06/2015 - 10:57am
single-dimensional searches
packet-level accounting
pipelined hash tables
Pipelines
Power demand
search engines
security of data
signal classification
signature tree
signature tree structure
packet classification
steep performance degradation
Table lookup
TCAM
ternary content addressable memory
ternary content addressable memory (TCAM)
Throughput
throughput via
traffic traces
tree data structures
high-throughput multimatch
bit rate 26.8 Gbit/s to 93.1 Gbit/s
complicated multidimensional search
content-addressable storage
Cryptography
distributed hash tables
edge-grouping
encoding
hash table
hash table lookup
asynchronous pipeline architecture
hybrid perfect hash table construction
IEEE transactions
intermediate data structure
interstage parallel access
Memory management
memory-efficient multimatch
multimatch packet classification problem
network intrusion detection
biblio
Real-time trust evaluation in integrated circuits
Submitted by BrandonB on Wed, 05/06/2015 - 10:37am
power-gating techniques
Trojan-infected variants
Trojan-free variants
Trojan horses
testing
statistical analysis
side-channel measurements
side-channel fingerprinting detection
shift registers
Semiconductor device measurement
reconfigurable linear feedback shift register array
real-time trust evaluation framework
advanced design skills
Power measurement
Power demand
post-fabrication trust evaluation methods
on-board global power consumption
LFSR array
invasive software
integrated circuits
hardware Trojan detection
Hardware
Erbium
chip trustworthiness
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »