Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Erbium
biblio
Customized Locking of IP Blocks on a Multi-Million-Gate SoC
Submitted by aekwall on Mon, 11/09/2020 - 1:31pm
integrated circuit design
VLSI testing
Solid modeling
off-site untrusted fabrication facilities
multiple IP blocks
multimillion-gate SoC
IP block
integrated circuit manufacture
industrial designs
IP piracy
logic design
Erbium
IP networks
industrial property
Logic gates
integrated circuits
logic locking
policy-based governance
composability
pubcrawl
Resiliency
system-on-chip
security
Hardware
biblio
Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
pubcrawl
tactical risk
Software Vulnerability
software fault tolerance
Servers
security of data
security
Safety
risk management
risk analysis
resource management
Resiliency
resilience
random system faults
CPS resilience
optimal cyber defense remediation
operational technology
Operational Resilience
operational impact assessment
information technology
graph theory
fault graph-based model
Erbium
data-driven attack graph
Damage Assessment
cyber-physical systems
cyber threats
cyber physical systems
biblio
A Topology Based Differential Privacy Scheme for Average Path Length Query
Submitted by aekwall on Mon, 06/22/2020 - 11:19am
Erbium
topology based differential privacy scheme
query function
privacy control parameters
node privacy protection
network vertices
edge-weighted privacy protection
differential privacy security mechanism
data query
average path length query
APL query
network topology
Euclidean distance
Scalability
Perturbation methods
Sensitivity
privacy protection
differential privacy
query processing
data availability
privacy
composability
pubcrawl
Human behavior
Resiliency
data privacy
biblio
Research in Fast Modular Exponentiation Algorithm Based on FPGA
Submitted by grigby1 on Tue, 01/21/2020 - 11:50am
Montgomery algorithm
systolic arrays
systolic array
Scalability
Resiliency
resilience
Q measurement
public-key cryptosystem
public-key cryptography
public-key algorithm
public key cryptography
pubcrawl
Montgomery modular multiplication
automation
Modular Multiplication
modular exponentiation on large number
modular exponentiation
mechatronics
logic design
frequency 170.0 MHz
FPGA
field programmable gate arrays
fast modular exponentiation algorithm
exponentiation
Erbium
Conferences
biblio
Research on Modeling Method of Visualized Plane Topology in Electric Power System
Submitted by aekwall on Mon, 01/20/2020 - 11:46am
platform development
visualized plane topology
user-defined power system
topology array file module
software metrics
software development
short development cycle
Resiliency
pubcrawl
primitive library module
power system visualization plane topology modeling
power system operation analysis
power system analysis computing
power system
platform interface module
algorithm module
plane topology modeling platform
Plane topology
model array file module
Microsoft Visual Studio
Microsoft Foundation Classes(MFC)
Microsoft Foundation Classes application framework
expandability
Erbium
Electric Power System
distribution network system
development method
composability
compatibility
biblio
AVAMAT: AntiVirus and malware analysis tool
Submitted by grigby1 on Tue, 01/23/2018 - 3:52pm
MetaDefender
VirusTotal
security tool
security assessment
Resiliency
pubcrawl
privacy
OS
operating systems (computers)
operating system platforms
Metrics
AntiVirus products
malware detection capabilities
Malware Analysis
Iron
invasive software
Human behavior
Erbium
AVAMAT
AV
antivirus-and-malware analysis tool
antivirus software
biblio
Fractal++: Closing the performance gap between fractal and conventional coherence
Submitted by BrandonB on Wed, 05/06/2015 - 2:43pm
performance scalability
multicores
observational equivalence
optimization
parallel invalidations
parallel processing
partially-serial-invalidations
performance gap
performance optimizations
Multicore processing
protocol optimizations
Protocols
reply-forwarding
Scalability
single-socket system
state explosion
verification scalability
verification-constrained architectures
formal verification
cache coherence protocol bugs
cache storage
Coherence
coherence verification approaches
contention-hints
decoupled-replies
directory protocols
Erbium
32-core simulations
four-socket system
fractal coherence
fractal protocols
Fractal++
Fractals
fully-parallel-fractal-invalidations
indirect-communication
longer-latency multisocket system
biblio
Decoupling Identity Resolution from the Maintenance of Identity Information
Submitted by BrandonB on Wed, 05/06/2015 - 1:21pm
Entity Resolution
Synchronization
Robustness
robust information access
quality management
Organizations
maintenance engineering
knowledge based systems
Context
decoupling identity resolution
EIIM model
entity identity structures
batch IR configuration
ER
Erbium
identity information
identity knowledge base
Identity Life Cycle Management
identity management service
IKB
information quality
information retrieval
Interactive Identity Resolution
biblio
Real-time trust evaluation in integrated circuits
Submitted by BrandonB on Wed, 05/06/2015 - 11:37am
power-gating techniques
Trojan-infected variants
Trojan-free variants
Trojan horses
testing
statistical analysis
side-channel measurements
side-channel fingerprinting detection
shift registers
Semiconductor device measurement
reconfigurable linear feedback shift register array
real-time trust evaluation framework
advanced design skills
Power measurement
Power demand
post-fabrication trust evaluation methods
on-board global power consumption
LFSR array
invasive software
integrated circuits
hardware Trojan detection
Hardware
Erbium
chip trustworthiness
biblio
Secure fault tolerance mechanism of wireless Ad-Hoc networks with mobile agents
Submitted by BrandonB on Wed, 05/06/2015 - 9:01am
related works
wireless self-organization networks
wireless ad hoc networks
unauthorized attempts
telecommunication security
telecommunication network reliability
signal processing
security threats
security reliability
security precautions
secure mobile agent
secure fault tolerance
secure communication
Ad hoc networks
mobile nodes
mobile agents
mobile agent migration
mobile agent
mobile ad hoc networks
Fault tolerant systems
fault tolerance
fault masking
Erbium
dynamic self-organization networks
Conferences
Ad-Hoc Network