Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Layout
biblio
Efficient and secure split manufacturing via obfuscated built-in self-authentication
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
Layout
untrusted foundries
trustworthiness
supply chains
split manufacturing
semiconductor supply chain
reverse engineering
pubcrawl170112
OBISA circuit
obfuscated built-in self-authentication
Logic gates
chip layout
IP piracy
invasive software
integrated circuits
integrated circuit reliability
integrated circuit manufacture
hardware Trojan insertion
Foundries
fabrication
delays
biblio
Trends on EDA for low power
Submitted by grigby1 on Wed, 03/08/2017 - 1:54pm
state-of-the-art microprocessors
low-power electronics
microprocessor chips
optimization
Physical design
power consumption
Power demand
power optimization
pubcrawl170110
Low power
transistor circuits
transistor layout
transistor network
transistor sizing
Transistors
visualization
visualization tools
AD 2012
Logic gates
Libraries
layout design automation tool
Layout
ISPD Contest
integrated circuit layout
electronic design automation
EDA algorithms
EDA
discrete gate sizing
continuous gate sizing
cell library
Algorithms
Algorithm design and analysis
AD 2013
biblio
EM-based detection of hardware trojans on FPGAs
Submitted by BrandonB on Wed, 05/06/2015 - 11:37am
Layout
Xilinx Virtex-II Pro target
Trojan placement
Trojan horses
Software
side-channel analysis
sequential denial-of-service
RapidSmith
Probes
malicious circuitry
logic design
AES design
invasive software
Hardware Trojan injection
hardware Trojan detection
Hardware
FPGA
field programmable gate arrays
EM-based detection
EM measurement
electromagnetic emanation
Clocks
biblio
On application of one-class SVM to reverse engineering-based hardware Trojan detection
Submitted by BrandonB on Wed, 05/06/2015 - 11:35am
one-class support vector machine
well-studied machine learning method
Trojan-free IC identification
Trojan horses
Training
test-time detection approach
Support vector machines
reverse engineering-based hardware Trojan detection
reverse engineering
one-class SVM
electronic engineering computing
learning (artificial intelligence)
Layout
invasive software
integrated circuits
Integrated circuit modeling
integrated circuit design
golden model
feature extraction
fabrication outsourcing
biblio
Word Cloud Explorer: Text Analytics Based on Word Clouds
Submitted by BrandonB on Tue, 05/05/2015 - 1:24pm
text analysis
word clouds
word cloud explorer
visualization paradigm
visualization method
visualization
user interfaces
text summarization
text analytics
text analysis tasks
Context
Tag clouds
sophisticated interaction techniques
Pragmatics
natural language processing
Layout
Interaction
data visualisation
context information
biblio
Visualization of Security Metrics for Cyber Situation Awareness
Submitted by BrandonB on Tue, 05/05/2015 - 12:08pm
Measurement
visualization
visual analytics technique
SIEM systems
security metric visualization
security information visualization
security information and event management systems
security
Olympic Games scenario
Network Security Status
network security level assessment
Abstracts
Layout
high level metrics visualization
data visualisation
data analysis
cyber situation awareness
computer network security
big data security
Big Data
Availability
« first
‹ previous
1
2
3
4
5