Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Inverters
biblio
CT PUF: Configurable Tristate PUF against Machine Learning Attacks
Submitted by aekwall on Tue, 09/21/2021 - 10:46am
security
Neural networks
Inverters
Physical Unclonable Function
Hardware
Hardware Security
Predictive models
Training
machine learning
biblio
Design and Implementation of a Secure Physical Unclonable Function In FPGA
Submitted by aekwall on Mon, 06/28/2021 - 12:40pm
Hamming distance
intellectual property security
Ring oscillators
Ring Oscillator PUF
Physical Unclonable Function
Intellectual Property Protection
Hardware Trojans
Challenge Response Pair
Inverters
field programmable gate arrays
Temperature measurement
Semiconductor device measurement
delays
policy-based governance
composability
pubcrawl
Resiliency
biblio
Scalable, Physical Effects Measurable Microgrid for Cyber Resilience Analysis (SPEMMCRA)
Submitted by grigby1 on Wed, 05/05/2021 - 12:21pm
Inverters
Scalable Security
scalable Microgrid
Scalability
resilience
pubcrawl
Microgrids
Mathematical model
Load modeling
Resiliency
industrial control system
industrial control
cyber-physical system
control systems
composability
automated security
Automated Response Action
biblio
A Moving Target Approach for Securing Secondary Frequency Control in Microgrids
Submitted by aekwall on Mon, 02/08/2021 - 1:40pm
inverter-based DG
cyber attack
DoS attacks
power generation control
denial of service attack
Cyber Dependencies
frequency control
Inverters
invertors
cyber attack threats
denial of service
Markov process
microgrid control systems
microgrid secondary frequency control
Moving Target
moving target approach
reactive defense approaches
secondary control
small-signal model
Load modeling
Scalability
Conferences
Resiliency
pubcrawl
Metrics
Decision Making
power engineering computing
power system security
control systems
computer network security
sensor data
distributed power generation
Microgrids
power generation scheduling
Human Factors
Markov processes
communication links
Compositionality
biblio
Physical Unclonable Function-Based Key Sharing via Machine Learning for IoT Security
Submitted by grigby1 on Fri, 10/30/2020 - 12:15pm
Protocols
lightweight security primitive
lookup table
LUT
machine learning
machine learning (ML)
one-to-one input-output mapping
Physical Unclonable Function
physical unclonable function (PUF)
physical unclonable function-based key sharing
private key cryptography
lightweight key sharing protocols
pubcrawl
PUF-based key sharing method
resource-constrained devices
Ring Oscillator
Scalability
security
security protocols
shared key
silicon physical unclonable function
Table lookup
I-O Systems
battery power
chip fabrication process
chip-unique key
computer network security
copy protection
crossover RO PUF
Cryptographic Protocols
Cryptography
delays
device authentication
authentication
i-o systems security
industry Internet of Things
Internet of Things
interstage crossing structure
Inverters
IoT security
key generation
Key-sharing
learning (artificial intelligence)
biblio
Design-Based Fingerprinting Using Side-Channel Power Analysis for Protection Against IC Piracy
Submitted by grigby1 on Thu, 07/30/2020 - 2:06pm
machine learning methods
integrated circuit modelling
integrated circuit testing
integrated circuits
Inverters
ip protection
IP/IC providers
learning (artificial intelligence)
Logic gates
machine learning
Integrated circuit modeling
Metrics
minimal design variations
modified netlist
pubcrawl
resilience
side-channel power analysis
supply chains
Trojan horses
fingerprinting scheme
policy-based governance
composability
IP piracy
Benchmark testing
circuit CAD
Computer crime
Cryptography
design-based fingerprinting
Fingerprinting
Resiliency
gate-level netlist changes
Hardware
Human behavior
Human Factors
IC design flow
IC piracy
industrial property
integrated circuit design
biblio
A Novel Self Oscillating Class Phi2 Inverter Topology
Submitted by grigby1 on Fri, 04/24/2020 - 4:08pm
single transistor
power conversion
power topologies
privacy
pubcrawl
resilience
Resiliency
self oscillating
self oscillating class phi2 inverter topology
power conversio GaN
Topology
topology behaviour
transistor switching signal
Transistors
VHF
VHF circuits
VHF oscillators
voltage 20.0 V
inverter
Class ϕ2
composability
drain signal
fast transient inverter topology
feedback circuit
frequency 1.0 MHz
frequency 30.0 MHz to 300.0 MHz
Gallium nitride
Capacitors
Inverters
invertors
Logic gates
Metrics
network topology
oscillating behaviors
Oscillators
biblio
Power-Electronics-Enabled Autonomous Power Systems
Submitted by grigby1 on Wed, 09/05/2018 - 10:47am
Smart Grid
power system resiliency
power system scalability
power system security
power system stability
pubcrawl
resilience
Resiliency
Scalability
power system reliability
smart power grids
solar cell arrays
solar panels
Special issues and sections
Stability analysis
Voltage control
wind turbines
Human behavior
Control Theory
distributed energy resources
distributed generation
distributed power generation
Electric Vehicles
energy management
energy storage systems
Frequency synchronization
control systems
Inverters
power electronic converters
power electronics-enabled autonomous system
power generation control
power generation reliability
power system control
Power system dynamics
biblio
Design of Boolean Chaotic Oscillator Using CMOS Technology for True Random Number Generation
Submitted by grigby1 on Thu, 05/24/2018 - 12:16pm
random number generation
message authentication
Metrics
National Institute of Standards and Technology
NI ELVIS platform
Oscillators
pubcrawl
random cryptographic keys
random key generation
Logic gates
random number generators
random numbers
resilience
Resiliency
Ring oscillators
Scalability
security keys
45nm CMOS technology
Inverters
Human behavior
Generators
delays
data transmission security
Cryptography
CMOS integrated circuits
CMOS Boolean Chaotic Oscillator Design
CMOS
chaos
Capacitors
Cadence Virtuoso tool
cadence virtuoso
authentication security
application specific integrated circuits
biblio
A Novel Hardware Trojan Detection with Chip ID Based on Relative Time Delays
Submitted by grigby1 on Wed, 04/11/2018 - 2:59pm
pubcrawl
Wires
Trojan horses
trojan horse detection
transient based post-layout simulation
time-delay
side-channel signal
sensor chains
sensor chain
security
RTD
Resiliency
resilience
relative time delays
chip ID
NMOS
Layout
Inverters
Integrated circuit modeling
Integrated circuit interconnections
hardware Trojan detection method
hardware trojan
Hardware
golden chip
delays
cyber physical systems
composability
« first
‹ previous
1
2
3
next ›
last »