Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Transistors
biblio
Cryogenic Transistor Confinement Well Simulation through Material and Carrier Transport Decoupling
Submitted by grigby1 on Fri, 05/12/2023 - 9:25am
Cryogenics
silicon-on-insulator
Semiconductors
Semiconductor process modeling
Fully Depleted Silicon-On-Insulator
Fi-nite Element Modelling
electrostatics
Cryogenic
confinement
pubcrawl
Electric potential
Resiliency
finite element analysis
Transistors
resilience
composability
quantum computing
biblio
Security System In The Safe With The Personal Identification Method Of Number Identification With Modulo Arthmatic Patterns
Submitted by grigby1 on Fri, 02/03/2023 - 4:09pm
Transistors
Selenoid door lock
security system
Password Keypad
12V Power Supply
pattern locks
passwords
Servomotors
open access
security
Waste materials
Scalability
Safety
Resiliency
resilience
Human behavior
pubcrawl
biblio
Quantum computing with CMOS technology
Submitted by grigby1 on Thu, 07/14/2022 - 2:42pm
quantum computing
pubcrawl
Hardware
Scalability
Buildings
Technological innovation
information processing
drugs
CMOS
CMOS technology
Silicon
spins
Transistors
VLSI
quantum computing security
biblio
Development of Security Starting System for Vehicles Based on IoT
Submitted by grigby1 on Thu, 06/09/2022 - 8:11am
Transistors
internet of vehicles security
vehicle emergency starting
Smart vehicle
Internet of Things (IoT)
ignition
car ignition system
cyber physical systems
System testing
Human Factors
automobiles
Internet of Things
Reliability
Metrics
Internet of Vehicles
security system
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
Deep Learning Based Approach for Hardware Trojan Detection
Submitted by grigby1 on Thu, 05/19/2022 - 12:04pm
deep learning
Neural networks
pubcrawl
resilience
Resiliency
Hardware
Analytical models
composability
Trojan horses
Hardware Trojans
Transistors
Distance measurement
Non-Invasive approach
outlier detection
trojan horse detection
biblio
Exploiting Process Variations to Protect Machine Learning Inference Engine from Chip Cloning
Submitted by grigby1 on Tue, 03/01/2022 - 3:19pm
network on chip security
Transistors
Throughput
testing
security
Scalability
Resiliency
resilience
pubcrawl
non-volatile memory
Cloning
Metrics
machine learning
inmemory computing
Hardware Security
Hardware accelerator
Engines
Deep Neural Network
composability
biblio
Stable cryptographic key generation using SRAM based Physical Unclonable Function
Submitted by grigby1 on Thu, 03/04/2021 - 2:06pm
SRAM fingerprint
random pattern
resilience
Resiliency
Scalability
secure IoT devices
SRAM
SRAM cells
SRAM chips
random number generation
SRAM physical unclonable function
SRAM PUF
Stability analysis
Static Random-Access Memory based PUFs
Threshold voltage
Transistors
Trusted Computing
zero trust
integrated circuits
Cadence Virtuoso tool
cryptographic key generation stability
cryptographic key sequence
Cryptography
digital fingerprint
fingerprint identification
hardware root-of-trust
Human Factors
authorisation
Internet of Things
IoT
MOS devices
Physical Unclonable Function
policy-based governance
power aware computing
pubcrawl
pufs
biblio
Analysis of the Most Common Software and Hardware Vulnerabilities in Microprocessor Systems
Submitted by grigby1 on Thu, 03/04/2021 - 1:45pm
resilience
Metrics
microcomputers
microprocessor systems
Microsoft Windows (operating systems)
network access
Production
Program processors
pubcrawl
remote attack
local computer calculation network
Resiliency
Server Message Block service
Silicon
Software Vulnerability
Transistors
WannaCry trojan encoder
Windows Operating System Security
Windows OS
encryption program
security
authorisation
composability
Computer crime
computer viruses
Computers
Cryptography
Data protection
Windows operating system
File systems
Hardware
hardware algorithm protection
hardware vulnerabilities
hardware vulnerability
information protection
information security
invasive software
biblio
Two-Stage Architectures for Resilient Lightweight PUFs
Submitted by aekwall on Mon, 11/16/2020 - 1:59pm
reverse engineering
Resilient Security Architectures
Product codes
physical unclonable function (PUF)
Maximum likelihood decoding
integrated circuit reliability
Differential Comparator PUF
Current Mirror PUF
arbiter PUF
Transistors
Threshold voltage
Binary codes
security of data
resilience
Decoding
program testing
machine learning
pubcrawl
Resiliency
invasive software
security
Internet of Things
field programmable gate arrays
biblio
Mesh Based Obfuscation of Analog Circuit Properties
Submitted by aekwall on Mon, 11/09/2020 - 12:41pm
satisfiability modulo theory based algorithm
Design methodology
effective transistor dimensions
enhanced security
key based obfuscation technique
LC tank voltage-controlled oscillator
mesh topology
obfuscated circuitry
obfuscated transistors
obfuscation methodology
physical dimensions
SAT
circuit functionality
SMT
target frequency
transistor circuits
transistor sizes
Transistors
varactor transistor
Varactors
VCO
voltage amplitude
voltage-controlled oscillators
encryption key
Resiliency
pubcrawl
composability
policy-based governance
probability
Topology
reverse engineering
computability
operating frequency
Threshold voltage
Cryptography
circuit design
IP piracy
2×6 mesh structure
analog circuit properties
Analog circuits
analog obfuscation
analog satisfiability algorithm
aSAT algorithm
auto-determine
Brute Force Attack
1
2
next ›
last »