Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trojan horses
biblio
Checkpoints Assignment on Cyber-Physical Digital Microfluidic Biochips for Early Detection of Hardware Trojans
Submitted by grigby1 on Wed, 02/26/2020 - 4:37pm
Resiliency
Hardware
hardware trojan
hardware Trojans attacks
invasive software
Lab-on-a-Chip
Microfluidics
piracy attacks
pubcrawl
resilience
frequent diseases detection
security
security concern
security study
Sequential analysis
supply chain security
tools
trojan horse detection
Trojan horses
cyber-physical digital microfluidic biochips
biochip design flow
biochips
biological techniques
bioprotocol manipulation attacks
checkpoint
checkpointing
checkpoints assignment
Computer crime
cyber physical systems
biochemical analysis
cyber-physical systems
denial-of-service attacks
digital microfluidic biochip
diseases
DMF biochip
Electrodes
error detection
error-recovery sensing systems
biblio
Hardware Trojan Detection Combine with Machine Learning: an SVM-based Detection Approach
Submitted by aekwall on Mon, 02/10/2020 - 11:43am
Predictive Metrics
Microelectronics Security
Xilinx SPARTAN-6
Trojan detection rate
Trojan detection
SVM-based detection approach
support vector machine classifier
support vector machine (SVM)
side-channel analysis (SCA)
side-channel analysis
SAKURA-G circuit board
IC
hardware Trojan detection
hardware trojan
security
integrated circuits
Trojan horses
Training
composability
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
Support vector machines
invasive software
Kernel
Hardware
field programmable gate arrays
biblio
Routing Aware and Runtime Detection for Infected Network-on-Chip Routers
Submitted by grigby1 on Mon, 11/04/2019 - 12:39pm
NoC
Trojan horses
system-on-chip
System recovery
security attacks
security
secure routing algorithm
secret key leaking
runtime detection
Runtime
Routing
Router Systems Security
Resiliency
resilience
pubcrawl
outsourcing
network on chip security
network-on-chip architecture
network-on-chip
network routing
Multiprocessors System-on-Chip
multiprocessing systems
MPSoC
Metrics
Malicious-tolerant Routing Algorithm
malicious Hardware Trojans
logic design
invasive software
integrated circuits
hardware trojan
Hardware
biblio
FPGA-oriented moving target defense against security threats from malicious FPGA tools
Submitted by aekwall on Mon, 09/09/2019 - 10:48am
FOMTD
Predictive Metrics
Xilinx
target defense
reverse engineering
moving target defense principle
malicious FPGA tools
hardware trojan
FPGA-oriented MTD method
FPGA users
FPGA security
FPGA hardware-software providers
FPGA emulation results
FPGA design suite
FPGA configuration
security of data
defense lines
moving target defense
Benchmark testing
Scalability
Hardware Security
security threats
Trojan horses
pubcrawl
Resiliency
Table lookup
security
Hardware
FPGA
field programmable gate arrays
biblio
Intelligent Malware Detection Using Oblique Random Forest Paradigm
Submitted by grigby1 on Mon, 06/10/2019 - 2:02pm
resilience
malware classification datasets
Metrics
Oblique Random Forest
oblique random forest ensemble learning technique
oblique random forest paradigm
pattern classification
privacy
pubcrawl
malware classification
Resiliency
security community
signature-based detection techniques
stealthy malware
Support vector machines
Trojan horses
unknown malware
behavior-based detection techniques
malware behavior
machine learning solutions
machine learning
learning (artificial intelligence)
invasive software
intelligent malware detection
Human behavior
Forestry
feature extraction
false positive rate
Decision trees
decision tree learning models
computerized online applications
comprehensive malware detection
classification accuracy
biblio
DLGraph: Malware Detection Using Deep Learning and Graph Embedding
Submitted by grigby1 on Mon, 06/10/2019 - 1:59pm
Metrics
Windows application programming interface calls
Windows API calls
Trojan horses
static analysis
stacked denoising autoencoders
softmax regression
SDA
Resiliency
representation learning
pubcrawl
privacy
pattern classification
noise reduction
neural nets
microsoft windows
application program interfaces
malware detection
Malware Analysis
learning (artificial intelligence)
invasive software
Human behavior
graph theory
graph embedding
function-call graphs
function-call graph
feature extraction
embedded vector
embedded systems
DLGraph
deep learning
combined feature vector classification
biblio
Property Specific Information Flow Analysis for Hardware Security Verification
Submitted by grigby1 on Mon, 05/20/2019 - 4:30pm
Scalability
Metrics
policy-based governance
potential security violations
property specific information flow analysis
property specific search
property specific trimming technique
pubcrawl
resilience
Resiliency
Mathematical model
security
security critical paths
security model
security of data
security property
security verification
timing
Trojan horses
unintended design flaws
hardware security verification
collaboration
Complexity theory
composability
Control Theory
Design methodology
formal verification
Hardware
hardware information flow analysis
Hardware Security
Acceleration
hardware security vulnerabilities
Hardware Trojans
Human behavior
Human Factors
information flow analysis
information flow models
information flow security
information theoretic security
biblio
Enabling Hardware Trojan Detection and Prevention through Emulation
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
Logic gates
Trojan horses
trojan horse detection
Trojan attack signatures
trojan
tools
Supply Chain
pubcrawl
programmable hardware
Payloads
emulation
invasive software
in-service systems
in-design systems
HWA
hardware Trojan detection
Hardware Assurance
Hardware
FPGA
field programmable gate arrays
biblio
Variation-Aware Hardware Trojan Detection through Power Side-Channel
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
integrated logic circuits
variation-aware hardware Trojan detection
Trojan-to-circuit power consumption
Trojan horses
trojan horse detection
side-channel analysis
Sensitivity
pubcrawl
process variation
power side-channel
Power demand
outsourcing
logic design
invasive software
Clock-tree Partition
integrated circuits
integrated circuit testing
HT detection sensitivity
HT activation chances
hardware trojan
Hardware
fine-grain circuit partitioning
Equal-power Partition
Detection sensitivity
Detectability
Cryptography
Clocks
biblio
Hardware Trojan Detection Using Path Delay Order Encoding with Process Variation Tolerance
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
Logic gates
variation-tolerant path delay order encoding technique
Trojan horses
trojan horse detection
security threats
security
pubcrawl
process variation tolerance
path delay information
outsourcing
delays
HT detection techniques
Hardware Trojans
hardware Trojan detection
Hardware
Foundries
fabrication
encoding
DfT
design-for-trust techniques
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »