Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trojan horses
biblio
Securing Network-on-Chips via Novel Anonymous Routing
Submitted by grigby1 on Tue, 03/01/2022 - 4:18pm
Proposals
Trojan horses
system-on-chips
Source Routing
security
Scalability
Routing
Resiliency
resilience
pubcrawl
anonymous routing
Network-on-Chips
network-on-chip
network on chip security
Metrics
hardware trojan
Hardware
Cryptography
Costs
composability
biblio
Detecting Malware, Malicious URLs and Virus Using Machine Learning and Signature Matching
Submitted by grigby1 on Mon, 02/07/2022 - 4:47pm
prediction
Virus
URL Detection
Signature Matching
Regression
signature
Malware Analysis
Random Forest
computer viruses
classification
Frequency conversion
Uniform resource locators
privacy
Trojan horses
malware
Radio frequency
Resiliency
resilience
Metrics
Human behavior
pubcrawl
machine learning
security
biblio
Detecting Trojan Attacks on Deep Neural Networks
Submitted by grigby1 on Mon, 11/08/2021 - 1:37pm
pubcrawl
Trojan horses
trojan horse detection
trojan
Training
supply chain security
Strips
Resiliency
resilience
composability
Predictive models
Prediction algorithms
neural network
deep learning
Data models
cyber physical systems
cyber physical security
Computational modeling
biblio
Detection of Trojan Based DoS Attacks on RSA Cryptosystem Using Hybrid Supervised Learning Models
Submitted by grigby1 on Mon, 11/08/2021 - 1:36pm
machine learning algorithms
Trojan horses
trojan horse detection
supply chain security
security
RSA
Resiliency
resilience
pubcrawl
Power profile
chipwhisperer
machine learning
Integrated circuit modeling
hardware Trojan horses
Hardware
Data models
cyber physical systems
cyber physical security
Cryptography
composability
biblio
IR-Drop Calibration for Hardware Trojan Detection
Submitted by grigby1 on Mon, 11/08/2021 - 1:36pm
process deviation
Voltage measurement
Trojan horses
trojan horse detection
supply chain security
Semiconductor device measurement
Ring Oscillator
Resiliency
resilience
pubcrawl
composability
Power supplies
IR-drop
Integrated circuit modeling
hardware trojan
Hardware
Frequency measurement
cyber physical systems
cyber physical security
biblio
A Novel Golden-Chip-Free Clustering Technique Using Backscattering Side Channel for Hardware Trojan Detection
Submitted by grigby1 on Mon, 11/08/2021 - 1:36pm
pubcrawl
Trojan horses
trojan horse detection
Trojan detection
supply chain security
Statistics
Sociology
reverse engineering
Resiliency
resilience
backscatter
integrated circuits
hardware trojan
Hardware Security
Hardware
cyber physical systems
cyber physical security
composability
clustering
Backscattering side-channel
biblio
Hardware Trojan Detection Based on SRC
Submitted by grigby1 on Mon, 11/08/2021 - 1:35pm
resilience
Trojan horses
trojan horse detection
Training
supply chain security
sparse representation-based classifier (SRC)
Size measurement
security
Resiliency
composability
pubcrawl
Noise measurement
machine learning
integrated circuits
hardware trojan
Hardware
cyber physical systems
cyber physical security
biblio
Hardware Trojan Detection Method Based on the Frequency Domain Characteristics of Power Consumption
Submitted by grigby1 on Mon, 11/08/2021 - 1:35pm
Hardware
Trojan horses
trojan horse detection
time-domain analysis
supply chain security
resilience
pubcrawl
Power demand
power analysis
Mahalanobis distance
Integrated circuit modeling
hardware trojan
Time Frequency Analysis and Security
frequency-domain analysis
Fourier transform
encryption
cyber physical systems
cyber physical security
composability
AES encryption circuit
Scalability
Predictive Metrics
Resiliency
biblio
Hardware Trojans Detection Based on BP Neural Network
Submitted by grigby1 on Mon, 11/08/2021 - 1:35pm
Power demand
Trojan horses
trojan horse detection
supply chain security
standards
side channel analysis
Resiliency
resilience
pubcrawl
Backpropagation
Neural networks
hardware trojan
Hardware
encryption
cyber physical systems
cyber physical security
composability
BP Neural Network
biblio
Hardware Trojan Detection Using Power Signal Foot Prints in Frequency Domain
Submitted by grigby1 on Mon, 11/08/2021 - 1:34pm
Hardware
Trojan horses
trojan horse detection
time-domain analysis
supply chain security
resilience
pubcrawl
Power demand
Logic gates
Hardware Trojan (HT) detection
Hardware Security
Time Frequency Analysis and Security
frequency-domain analysis
Frequency domain and Power footprints
delays
cyber physical systems
cyber physical security
composability
Scalability
Predictive Metrics
Resiliency
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »