Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Table lookup
biblio
Real-Time FPGA Investigation of Interplay Between Probabilistic Shaping and Forward Error Correction
Submitted by grigby1 on Mon, 07/31/2023 - 3:48pm
pubcrawl
Metrics
resilience
field programmable gate arrays
composability
real-time systems
Table lookup
Probabilistic logic
Random access memory
forward error correction
parity check codes
Resiliency
optical fiber communication
field-programmable gate array
Distribution matching
probabilistic shaping
biblio
Unified Lightweight Authenticated Encryption for Resource-Constrained Electronic Control Unit
Submitted by grigby1 on Thu, 07/13/2023 - 11:47am
encryption
pubcrawl
resilience
Resiliency
Throughput
Hardware
composability
real-time systems
side-channel attacks
Switches
Table lookup
efficient encryption
Controller Area Net-work
electronic control units
Lightweight Authenticated Encryption
biblio
Look-Up Table based FHE System for Privacy Preserving Anomaly Detection in Smart Grids
Submitted by grigby1 on Fri, 01/20/2023 - 3:59pm
pubcrawl
Metrics
Resiliency
privacy
Smart Grid
smart meters
Smart Grids
Table lookup
information retrieval
Systematics
Power demand
Privacy-preserving
FHE
anomaly (attack) detection
look-up table
Smart Grid Privacy
biblio
Protecting White-Box Block Ciphers with Galois/Counter Mode
Submitted by aekwall on Tue, 12/20/2022 - 4:20pm
encryption
pubcrawl
Metrics
Resiliency
composability
encoding
AES
Ciphers
Costs
Table lookup
White Box Security
Block Cipher
Cipher working mode
the Galois/Counter Mode
white-box cryptography
biblio
A High Speed Montgomery Multiplier Used in Security Applications
Submitted by grigby1 on Tue, 04/19/2022 - 9:46am
Montgomery multiplier
Table lookup
signal processing security
signal processing
Reverse carry propagate adder
Resiliency
resilience
pubcrawl
privacy
exponentiation
Metrics
Filtering
delays
data communication
cryptosystem
Cryptography
composability
adders
biblio
Efficient Acceleration of Decision Tree Algorithms for Encrypted Network Traffic Analysis
Submitted by grigby1 on Tue, 03/01/2022 - 3:19pm
Pipelines
Wires
Vegetation
threat
telecommunication traffic
Table lookup
Scalability
Resiliency
resilience
pubcrawl
Acceleration
network on chip security
Network
Metrics
detection
Decision trees
Decision Tree
Cryptography
composability
biblio
Twine Stack: A Hybrid Mechanism Achieving Less Cost for Return Address Protection
Submitted by grigby1 on Fri, 02/04/2022 - 1:49pm
Hardware
Table lookup
shadow stack
Runtime
return-oriented programming
Return Oriented Programming (ROP)
return oriented programming
resilience
programming
message authentication code
rop attacks
Costs
codes
authentication
Human Factors
composability
Scalability
Resiliency
pubcrawl
biblio
Enhancing SAT-Attack Resiliency and Cost-Effectiveness of Reconfigurable-Logic-Based Circuit Obfuscation
Submitted by aekwall on Fri, 02/04/2022 - 9:35am
reverse engineering
security
Observability
Routing
resilience
pubcrawl
Integrated circuit modeling
logic locking
Switching circuits
Resiliency
Table lookup
LUT-based obfuscation
Reconfigurable Logic
SAT-based attack
biblio
An Efficient Structural Analysis of SAS and its Application to White-Box Cryptography
Submitted by aekwall on Mon, 01/31/2022 - 3:11pm
Resiliency
white-box
White Box Security
Time complexity
Table lookup
Synthetic aperture sonar
structural analysis
security
SAS strcuture
white box cryptography
pubcrawl
IEEE Regions
encryption
Cryptography
Metrics
resilience
composability
biblio
SPFA: SFA on Multiple Persistent Faults
Submitted by grigby1 on Thu, 09/30/2021 - 11:54am
multiple fault diagnosis
Transient analysis
Table lookup
statistical fault analysis
Resiliency
resilience
Random access memory
pubcrawl
persistent fault attack
Ciphers
Metrics
maximum likelihood estimation
Human Factors
Human behavior
Fault attack
encryption
cyber physical systems
Circuit faults
1
2
3
4
next ›
last »