Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
intellectual property
biblio
TTLock: Tenacious and traceless logic locking
Submitted by grigby1 on Tue, 01/23/2018 - 3:24pm
IP piracy
TTLock
reverse engineering
Resiliency
resilience
pubcrawl
policy-based governance
Policy
logic locking
IP piracy revention
collaboration
Interference
intellectual property protection technique
intellectual property
industrial property
Foundries
computer science
Computers
Computer crime
composability
biblio
Dynamically obfuscated scan for protecting IPs against scan-based attacks throughout supply chain
Submitted by grigby1 on Tue, 01/23/2018 - 3:21pm
Resiliency
ip protection
Logic gates
noninvasive scan attacks
pattern generation time
Policy
policy-based governance
pubcrawl
Registers
intellectual property
scan-based attacks
scan-based test
Secure Scan
security
Supply Chain
supply chains
Testability
automatic test pattern generation
integrated circuits
integrated circuit testing
integrated circuit test flow
integrated circuit manufacturing
integrated circuit manufacture
integrated circuit design
industrial property
EDA generated scan chains
dynamically-obfuscated scan design
Discrete Fourier transforms
composability
collaboration
Clocks
chip security
boundary scan testing
biblio
A study of intellectual property protection for mass innovation spaces
Submitted by grigby1 on Tue, 01/23/2018 - 3:21pm
ip protection
Technological innovation
standards
Resiliency
pubcrawl
policy-based governance
Policy
patents
mass innovation space innovative development
Mass Innovation Space
mass entrepreneurship and innovation
Law
collaboration
Intellectual Property Service Standards
Intellectual Property Protection
intellectual property
intellectual cluster management innovation
innovation management
industrial property
industrial economics
Entrepreneurship
economic model
Conferences
composability
biblio
A novel SVD and online sequential extreme learning machine based watermark method for copyright protection
Submitted by grigby1 on Tue, 01/23/2018 - 3:21pm
learning (artificial intelligence)
watermarking scheme
Watermarking
watermarked image
Training
tools
SVD
singular value decomposition
Resiliency
pubcrawl
PSNR
policy-based governance
Policy
OSELM
original host image
online sequential extreme learning machine based watermark method
BER
IWT domain
IWT
ip protection
intellectual property
image watermarking
Image coding
Electronic mail
discrete wavelet transforms
copyright protection
copyright
computer science
composability
collaboration
blind digital watermark algorithm
Bit error rate
biblio
Boolean Circuit Camouflage: Cryptographic Models, Limitations, Provable Results and a Random Oracle Realization
Submitted by grigby1 on Tue, 01/23/2018 - 3:21pm
camouflaging
collaboration
composability
Cryptography
Hardware Security
intellectual property
IP piracy
ip protection
piracy
Policy
policy-based governance
program obfuscation
pubcrawl
Resiliency
biblio
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
Resiliency
intellectual property theft
Intrusion Detection Systems
Metrics
organisational aspects
Organizations
policy-based governance
psychology
pubcrawl
intellectual property
role-based profile assessment
sensitive organizational data access
synthetic data-driven scenarios
tree data structures
tree-structure profiling
User behavior
user profile assessment
visual analytics tools
data analysis
authorisation
authorized data access
automated insider threat detection system
business data processing
business reputation
collaboration
computer security
cyber security
Anomaly Detection
data visualisation
Electronic mail
feature extraction
financial theft
Human behavior
Human Factors
insider threat
Insider Threats
biblio
On the Possibility of Insider Threat Prevention Using Intent-Based Access Control (IBAC)
Submitted by grigby1 on Tue, 12/12/2017 - 1:23pm
motivation detection
Insider Threats
intellectual property
intent authentication
intent-based access control
intention detection
involuntary electroencephalogram reactions
malicious insiders
Metrics
insider threat prevention
nonidentity-based authentication
P300
physiology
policy-based governance
pubcrawl
Resiliency
Terrorism
Human behavior
Accuracy
authentication
authorisation
brain signals
collaboration
electroencephalogram (EEG)
electroencephalography
event-related potential (ERP)
Access Control
Human Factors
IBAC
identity enrolment
identity recognition
industrial property
information technology
insider threat
biblio
Effect of data size on performance of free-text keystroke authentication
Submitted by grigby1 on Wed, 03/08/2017 - 2:47pm
imposter pass rate
testing
test sample size
standards
reference profile size
public datasets
pubcrawl170115
physiological traits
keystroke data
Keyboards
IPR
intellectual property
authentication
free-text keystroke authentication
FAR
false alarm rate
Distance measurement
Databases
data size
biometrics (access control)
bioinformatics
behavioral biometric
authorisation
authentication performance
file
Verification across Intellectual Property Boundaries
Submitted by akarns on Fri, 01/29/2016 - 12:53pm. Contributor:
Sagar Chaki
Presented as part of the
2016 HCSS conference
.
Validation and Verification
Foundations
intellectual property
protocol
High Confidence Software and Systems Conference 2016
Presentation
Reasoning / IP
HCSS 2016
biblio
Reverse Engineering Digital Circuits Using Structural and Functional Analyses
Submitted by BrandonB on Wed, 05/06/2015 - 11:42am
reverse engineering
integrated circuit design
integrated circuits
intellectual property
invasive software
IP theft
IP violation detection
Logic gates
register files
Inference algorithms
SoC design
structural analysis
subtractors
system-on-chip
test circuits
Trojan horses
unstructured netlist
very large highly-optimized system-on-chip design
functional analysis
Algorithm design and analysis
algorithmic reverse engineering digital circuits
combinational elements
computer security
counters
design automation
Digital circuits
formal verification
adders
Globalization
globalized multivendor environment
Hardware
hardware trojans-malware
high-level netlist
ICs
industrial property
« first
‹ previous
1
2
3
4
5
6
7