Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
finite state machine
biblio
Computation Termination and Malicious Node Detection using Finite State Machine in Mobile Adhoc Networks
Submitted by grigby1 on Mon, 12/28/2020 - 12:03pm
Resiliency
Metrics
mobile ad hoc networks
moving capability
networking domain
participating nodes
pubcrawl
radio range nodes
resilience
MANET
rigid infrastructure
security
telecommunication network topology
telecommunication security
wired line networks
wireless links
wireless medium
wireless technology
finite state machines
active centralized system
ad hoc network
arbitrary basis
attacks
Compositionality
computation termination
execution purpose
finite state machine
MANET Attack Detection
FSM
Handheld computers
high growth rate
highly dynamic topology
hostile free environment
malicious node
malicious node detection
biblio
Mystic: Mystifying IP Cores Using an Always-ON FSM Obfuscation Method
Submitted by aekwall on Mon, 11/09/2020 - 12:32pm
integrated circuit industry
IP piracy
application specific integrated circuits
ASIC technology
circuit complexity
combinational circuits
finite state machine
FSM obfuscation method
hardware obfuscation method
Hardware Security
IP overproduction
ITC99 circuit benchmarks
logic encryption
Logic masking
Mystic obfuscation approach
Mystic protection method
mystifying IP cores
Logic gates
Hardware
Resiliency
pubcrawl
composability
policy-based governance
Production
Complexity theory
microprocessor chips
IP networks
obfuscation
reverse engineering
encoding
finite state machines
logic circuits
logic design
size 45.0 nm
biblio
United We Stand: A Threshold Signature Scheme for Identifying Outliers in PLCs
Submitted by grigby1 on Fri, 09/04/2020 - 2:16pm
Pulse width modulation
malware
Metrics
OpenPLC software
particular state
Pins
PLCs
predefined states
programmable controllers
Protocols
Prototypes
pubcrawl
malicious disruption
pulse width modulation pins
PWM
Raspberry Pi
Registers
resilience
Resiliency
Scalability
security
signature shares
uncorrupted PLC
group-signature
\$-threshold signature scheme
Anomaly Detection
BIOS Security
compromised state
control engineering computing
corrupted PLC
cyber security awareness week-2017 competition
digital signatures
electro-mechanical processes
finite state machine
finite state machines
(k
Human Factors
I-O Systems
i-o systems security
I/O pin configuration attack
input-output mechanism
IO pin configuration attack
l)-threshold signature scheme
Legacy PLC system
legacy PLCs
malicious code
biblio
A New Pay-Per-Use Scheme for the Protection of FPGA IP
Submitted by grigby1 on Thu, 07/30/2020 - 12:53pm
complex FPGA designs
ip protection
reusable intellectual property design blocks
Physical Unclonable Function
pay-per-use
IP instance
IP infringement
FSM
FPGA IP vendor
FPGA IP protection
finite state machine
Field-Programmable Gate Arrays
Design methodology
copy protection
logic design
application specific integrated circuits
finite state machines
Licenses
composability
PUF
industrial property
field programmable gate arrays
Resiliency
resilience
policy-based governance
pubcrawl
IP networks
security
biblio
The undetectable clock cycle sensitive hardware trojan
Submitted by grigby1 on Wed, 02/21/2018 - 12:41pm
Hardware
Trusted design
Trojan horses
trees (mathematics)
Resiliency
resilience
redundant circuits
pubcrawl
Microelectronic Security
Metrics
invasive software
HT
Hardware Trojans
Circuit faults
FSM
finite state machines
finite state machine
embedded systems
embedded clock-cycle-sensitive hardware trojans
delays
Cryptography chips
Cryptography
critical path
composability
Clocks
clock tree structure
biblio
Using Dynamic Taint Approach for Malware Threat
Submitted by grigby1 on Tue, 03/07/2017 - 12:40pm
pubcrawl170109
Information Flow
intersuspicious modules
invasive software
malware
Malware behavioural analysis
malware infection
malware threat analysis
network threats
FSM
Servers
suspicious apps
taint checking tools
taint marking
threat analysis
trees (mathematics)
weighted spanning tree analysis scheme
Computer hacking
Android programs
attack sequence
behavioural analysis
cloud applications
Cloud Computing
cloud computing server
Computational modeling
Computer crime
Analytical models
cyber security attack
data tracking
defence capability
Dynamic taint propagation
dynamic taint propagation analysis model
finite state machine
finite state machines
biblio
A Novel Acoustic Fingerprint Method for Audio Signal Pattern Detection
Submitted by BrandonB on Mon, 05/04/2015 - 10:32am
finite state machine
Time-Frequency processing
Time-frequency Analysis
time-domain analysis
speech recognition techniques
Spectral signature
Pitch frequency
Pattern recognition
Noise measurement
mechanical sounds
hybrid time-frequency approach
FSM model
frequency-domain analysis
finite state machines
Finite State Machine(FSM)
Acoustic Fingerprint
efficient audio signal recognition algorithm
Correlation
computational complexity
background noises
audio signal processing
audio signal pattern detection
Audio recognition
Audio detection
Acoustics
Acoustic signal processing
acoustic signal detection
acoustic noise
acoustic fingerprint method