Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hardware trojan
biblio
Semi-supervised Trojan Nets Classification Using Anomaly Detection Based on SCOAP Features
Submitted by grigby1 on Fri, 08/18/2023 - 4:11pm
integrated circuits
Testability
gate-level
Resiliency
ICS Anomaly Detection
supervised learning
hardware trojan
Hardware Security
Trojan horses
Logic gates
Scalability
Hardware
resilience
pubcrawl
Anomaly Detection
machine learning
feature extraction
Training
biblio
Energy-Efficient Black Hole Router Detection in Network-on-Chip
Submitted by aekwall on Fri, 02/17/2023 - 10:44am
Energy Efficiency
Multiprocessor interconnection
Integrated circuit interconnections
HT
Energy-Efficient
black hole
BHR
outsourcing
Router Systems Security
hardware trojan
Runtime
NoC
network-on-chip
Predictive Metrics
Throughput
Resiliency
pubcrawl
biblio
Sensing with Random Encoding for Enhanced Security in Embedded Systems
Submitted by grigby1 on Fri, 09/30/2022 - 3:56pm
Hardware Security
random sensing
random encoding
ios
iOS Security
telemetry
Resiliency
Satellites
hardware trojan
timing
security
Compositionality
Trojan horses
encoding
sensors
resilience
Metrics
Human Factors
pubcrawl
biblio
Hardware Trojan for Lightweight Cryptoraphy Elephant
Submitted by aekwall on Thu, 05/19/2022 - 1:42pm
Cryptography
Trojan horses
Hardware
Human Factors
Conferences
pubcrawl
Scalability
Metrics
Resistance
hardware trojan
Hardware Security
Consumer electronics
Elephant
lightweight cryptography
Tamper resistance
biblio
Genetic Algorithm based Hardware Trojan Detection
Submitted by grigby1 on Thu, 05/19/2022 - 1:02pm
transition probability
trojan horse detection
Trigger coverage
Test pattern generators
SCOAP
Logical Testing
ISCAS ’85 and 89
and Trojan coverage
masking
Communication Systems
genetic algorithm
pubcrawl
genetic algorithms
Trojan horses
hardware trojan
Benchmark testing
composability
integrated circuits
Hardware
Resiliency
resilience
biblio
Detection of Hardware Trojan in Presence of Sneak Path in Memristive Nanocrossbar Circuits
Submitted by grigby1 on Thu, 05/19/2022 - 12:59pm
pubcrawl
resilience
Resiliency
Hardware
composability
delays
hardware trojan
Trojan horses
testing
Degradation
Time measurement
Memristive
memristors
Nano crossbar
Sneak Path
trojan horse detection
biblio
Hardware-Trojan Classification based on the Structure of Trigger Circuits Utilizing Random Forests
Submitted by grigby1 on Thu, 05/19/2022 - 12:59pm
composability
trojan horse detection
netlist
hardware trojan
manufacturing
Hardware Security
Random Forest
Trojan horses
Benchmark testing
Internet of Things
integrated circuits
Hardware
Resiliency
resilience
pubcrawl
machine learning
feature extraction
biblio
Securing Network-on-Chips via Novel Anonymous Routing
Submitted by grigby1 on Tue, 03/01/2022 - 4:18pm
Proposals
Trojan horses
system-on-chips
Source Routing
security
Scalability
Routing
Resiliency
resilience
pubcrawl
anonymous routing
Network-on-Chips
network-on-chip
network on chip security
Metrics
hardware trojan
Hardware
Cryptography
Costs
composability
biblio
IR-Drop Calibration for Hardware Trojan Detection
Submitted by grigby1 on Mon, 11/08/2021 - 1:36pm
process deviation
Voltage measurement
Trojan horses
trojan horse detection
supply chain security
Semiconductor device measurement
Ring Oscillator
Resiliency
resilience
pubcrawl
composability
Power supplies
IR-drop
Integrated circuit modeling
hardware trojan
Hardware
Frequency measurement
cyber physical systems
cyber physical security
biblio
A Novel Golden-Chip-Free Clustering Technique Using Backscattering Side Channel for Hardware Trojan Detection
Submitted by grigby1 on Mon, 11/08/2021 - 1:36pm
pubcrawl
Trojan horses
trojan horse detection
Trojan detection
supply chain security
Statistics
Sociology
reverse engineering
Resiliency
resilience
backscatter
integrated circuits
hardware trojan
Hardware Security
Hardware
cyber physical systems
cyber physical security
composability
clustering
Backscattering side-channel
1
2
3
4
5
next ›
last »