Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
industrial property
biblio
Development of a Decision Support System for Intellectual Property Utilization
Submitted by grigby1 on Mon, 11/02/2020 - 12:28pm
Law
Task Analysis
targeted generation
Resiliency
resilience
pubcrawl
policy-based governance
Organizations
multiagent systems
multi-agent systems
Monitoring
composability
intellectual property utilization
intellectual property security
intellectual property
industrial property
Economics
deterministic logic
decision-making models and algorithms
Decision support systems
decision support system
biblio
Design patterns for the industrial Internet of Things
Submitted by grigby1 on Mon, 11/02/2020 - 11:41am
Industries
wireless sensor networks
sensors
security
Scalability
pubcrawl
production engineering computing
process optimization
process control
privacy concerns
object-oriented programming
leveraging multiple information sources
Internet of Things
interconnected sensors
Industry 4.0
Cloud Computing
industrial revolution
industrial property
Industrial IoT
Industrial Internet of Things
industrial control system setting
industrial control
iiot
i/o systems security
i-o systems security
Design patterns
data privacy
data flow semantics
cost reduction
biblio
A Novel Logical Locking Technique Against Key-Guessing Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
Observability
intellectual property piracy
ISCAS'85 benchmark circuits
key guessing attacks
Key-gates
key-guessing attacks
logical locking
logical locking technique
logically locked design
intellectual property
path sensitization attacks
Secret key
secured hardware
secured locking mechanism
system analysis and design
Testability measures
Trojan insertion
brute force attacks
integrated circuits
Hardware
private key cryptography
Hamming distance
pubcrawl
collaboration
Computer crime
Human Factors
policy-based governance
invasive software
added logics
Brute Force Attack
embedded computing
hardware attacks
hill climbing attack
illegal integrated circuit overproduction
industrial property
biblio
Identification of State Registers of FSM Through Full Scan by Data Analytics
Submitted by grigby1 on Fri, 08/28/2020 - 3:55pm
industrial property
state transitions
state register identification
Silicon
Scalability
Resiliency
resilience
regression analysis
Registers
pubcrawl
Physical design
OpenCores
logic design
Intellectual Property Protection
Big Data
FSM state registers
FSM design
finite-state machine
finite state machines
electronic engineering computing
downstream design
Decision trees
Decision Tree
Data protection
Data mining
data analysis
big data security metrics
Big Data Analytics
biblio
DeepAttest: An End-to-End Attestation Framework for Deep Neural Networks
Submitted by aekwall on Mon, 08/17/2020 - 11:36am
on-device DNN attestation method
hardware-software codesign
Human behavior
industrial property
intelligent devices
intelligent platforms
IP concern
ip protection
learning (artificial intelligence)
manufactured hardware
neural nets
hardware-level intellectual property
pubcrawl
queried DNN
Resiliency
Software/Hardware Codesign
target platform
TEE-supported platforms
Trusted Execution Environment
unregulated usage
usage control
device provider
application usage
attestation
attestation criterion
authorisation
authorized DNN programs
composability
deep learning frameworks
deep neural networks
DeepAttest overhead
DeepAttest provisions
application program interfaces
device-specific fingerprint
DNN applications
DNN benchmarks
DNN program
embedded fingerprint
end-to-end attestation framework
FP
hardware architectures
hardware-bounded IP protection impair
biblio
Best of Both Worlds: Integration of Split Manufacturing and Camouflaging into a Security-Driven CAD Flow for 3D ICs
Submitted by grigby1 on Thu, 07/30/2020 - 2:06pm
pubcrawl
Layout
layout camouflaging
LC
malicious entities
manufacturing
manufacturing flow
manufacturing paradigm
Metrics
production engineering computing
ip protection
resilience
reverse engineering
security
security-driven CAD flow
SM
split manufacturing
supply chains
Three-dimensional displays
extensive security analysis
policy-based governance
composability
IP piracy
3D ICs
business models
CAD
Cryptography
DRC-clean layouts
Resiliency
Foundries
Human behavior
Human Factors
industrial property
integrated circuit design
integrated circuit manufacture
integrated circuits
IP networks
biblio
Design-Based Fingerprinting Using Side-Channel Power Analysis for Protection Against IC Piracy
Submitted by grigby1 on Thu, 07/30/2020 - 2:06pm
machine learning methods
integrated circuit modelling
integrated circuit testing
integrated circuits
Inverters
ip protection
IP/IC providers
learning (artificial intelligence)
Logic gates
machine learning
Integrated circuit modeling
Metrics
minimal design variations
modified netlist
pubcrawl
resilience
side-channel power analysis
supply chains
Trojan horses
fingerprinting scheme
policy-based governance
composability
IP piracy
Benchmark testing
circuit CAD
Computer crime
Cryptography
design-based fingerprinting
Fingerprinting
Resiliency
gate-level netlist changes
Hardware
Human behavior
Human Factors
IC design flow
IC piracy
industrial property
integrated circuit design
biblio
Trademark Image Retrieval Using a Combination of Deep Convolutional Neural Networks
Submitted by grigby1 on Thu, 07/30/2020 - 2:06pm
registered trademarks
ip protection
Combination of convolutional neural networks
content-based image retrieval
convolution
deep convolutional neural networks
feedforward neural nets
image recognition
industrial-intellectual property registration
METU database
Trademarks
Trademark Image Retrieval
trademark image retrieval task
trademark images
trademark protection
trademark registration applications
Trademarks Office
VGG19c
VGG19v
visual similarity
Task Analysis
Human behavior
Human Factors
policy-based governance
resilience
Resiliency
industrial property
composability
content-based retrieval
Metrics
pubcrawl
feature extraction
image classification
visualization
convolutional neural networks
image representation
image retrieval
Shape
patents
trademark registration
biblio
Machine Learning IP Protection
Submitted by grigby1 on Thu, 07/30/2020 - 2:05pm
learning (artificial intelligence)
Trusted Computing
system security architecture mechanisms
security of data
Resiliency
resilience
pubcrawl
proprietary machine learning models
policy-based governance
Metrics
Machine Learning IP protection
machine learning
application domains
ip protection
intellectual property security
intellectual property
Intellectual Properties (IP)
industrial property
Human Factors
Human behavior
deep learning
computer security
composability
biblio
Intellectual Property Management in Serious Games
Submitted by grigby1 on Thu, 07/30/2020 - 2:05pm
patents
utility models
technology transfer strategies
Technology Transfer
serious games
research and development
public universities
Public National Universities
knowledge factories
Irrigation
intellectual property rights protection analysis
Educational institutions
intellectual property management
ip protection
Technological innovation
pubcrawl
serious games (computing)
computer aided instruction
intellectual property
Metrics
Games
composability
industrial property
Analytical models
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
« first
‹ previous
1
2
3
4
5
6
next ›
last »