Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fabrication
biblio
SoC Trust Validation Using Assertion-Based Security Monitors
Submitted by grigby1 on Fri, 08/12/2022 - 2:09pm
automata
System Verilog Assertions
Security and Hardware Monitors
Property Specification Language
Assertion Based Verification
system-on-chip
fabrication
compiler security
Metrics
tools
Layout
Runtime
composability
Hardware
Resiliency
pubcrawl
security
biblio
Applied Cryptography in Network Systems Security for Cyberattack Prevention
Submitted by grigby1 on Tue, 08/02/2022 - 4:20pm
Applied cryptography
Cryptography
encryption
fabrication
Hash functions
Interception
Interruption
modification
network security
pubcrawl
Public key
resilience
Resiliency
RSA
Trustworthy Systems
Virtual private networks
biblio
Link Latency Attack in Software-Defined Networks
Submitted by aekwall on Fri, 07/01/2022 - 9:45am
Training
real-time systems
machine learning
Switches
pubcrawl
Scalability
Resiliency
Topology
wireless networks
network topology
fabrication
Link Fabrication Attack
Link Latency
Software-defined networking (SDN)
Topology Poisoning
Chained Attacks
biblio
Characterizing Corruptibility of Logic Locks using ATPG
Submitted by aekwall on Tue, 02/22/2022 - 2:18pm
pattern locks
Conferences
corruptibility
fabrication
Focusing
hardware security metrics
Integrated circuit synthesis
logic locking
Measurement
Measurement and Metrics Testing
Metrics
pubcrawl
Runtime
sequential circuits
biblio
Prevention Techniques Employed in Wireless Ad-Hoc Networks
Submitted by grigby1 on Thu, 10/29/2020 - 11:32am
optimisation
wireless sensor networks
Wireless communication
Wireless Ad-Hoc Networks
vehicular ad hoc networks
VANET
telecommunication security
telecommunication network routing
Routing
Resiliency
resilience
pubcrawl
Ad hoc networks
Metrics
manet attack prevention
MANET
genetic algorithm
fabrication
Compositionality
Communication system security
Black hole attack
Artificial Bee Colony
Ad-hoc wireless networks
biblio
Hardware Trojan Detection Using Path Delay Order Encoding with Process Variation Tolerance
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
Logic gates
variation-tolerant path delay order encoding technique
Trojan horses
trojan horse detection
security threats
security
pubcrawl
process variation tolerance
path delay information
outsourcing
delays
HT detection techniques
Hardware Trojans
hardware Trojan detection
Hardware
Foundries
fabrication
encoding
DfT
design-for-trust techniques
biblio
A Co-Training Based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
Integrated circuit modeling
unlabeled ICs
unlabeled IC
unlabeled fabricated IC
Trojan horses
trojan horse detection
Training
simulated IC
Silicon
reliable detection capability
pubcrawl
pattern classification
learning (artificial intelligence)
invasive software
accurate classification model
inaccurate simulation models
IC labeling
hardware Trojan detection
Hardware Security
Hardware
golden chip
fabrication
fabricated golden chips
co-training based hardware Trojan detection technique
co-training
classification-based golden chips-free hardware Trojan detection technique
Classification algorithms
actual silicon fabrication
biblio
Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
novel clustering ensemble method
untrustworthy testing party
untrustworthy testing parties
Unsupervised Learning
trusted hardware Trojan detection framework
Trusted Computing
Trojan horses
trojan horse detection
testing stage
testing
robust hardware Trojan detection framework
pubcrawl
pattern clustering
novel clustering ensemble technique
Clustering algorithms
invasive software
integrated circuit testing
Integrated circuit modeling
IC
hardware Trojan detection
Hardware Security
Hardware
golden models-free hardware Trojan detection framework
fabrication process
fabrication
existing hardware Trojan detection
clustering ensemble
biblio
Elimination of internal attacksfor PUMA in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
multicast protocols
telecommunication security
single sender node
security
Routing protocols
Routing
Resiliency
resilience
receiver nodes
PUMA
pubcrawl
Protocol for Unified Multicasting through Announcements
network resources
multicast routing protocol
communication costs
multicast communication
multicast announcement packet fabrication attack
multicast activity-based overhearing technique
mobile ad hoc networks
Metrics
MANET
MA FabricationAttack
Key exchange
internal attacks
Group communication
fabrication
Conferences
Compositionality
biblio
Scan chain based IP fingerprint and identification
Submitted by grigby1 on Mon, 06/11/2018 - 3:23pm
intellectual property
Silicon
security
scan chain
Scalability
Resiliency
resilience
pubcrawl
network on chip security
Metrics
ip protection
IP networks
IP identification
IP fingerprint
copy protection
integrated circuits
integrated circuit design
industrial property
identification technology
IC identification
fingerprinting techniques
Fingerprint recognition
fault coverage
fabrication
digital fingerprinting
digital fingerprint
delays
1
2
next ›
last »