Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
structural analysis
biblio
An Efficient Structural Analysis of SAS and its Application to White-Box Cryptography
Submitted by aekwall on Mon, 01/31/2022 - 3:11pm
Resiliency
white-box
White Box Security
Time complexity
Table lookup
Synthetic aperture sonar
structural analysis
security
SAS strcuture
white box cryptography
pubcrawl
IEEE Regions
encryption
Cryptography
Metrics
resilience
composability
biblio
Bipartite network model for inferring hidden ties in crime data
Submitted by grigby1 on Tue, 03/07/2017 - 12:30pm
hidden ties inference
vertex level metrics
underground forum data
underground forum
structural analysis
standard network algorithm
Social network services
security of data
relationship mapping
pubcrawl170109
pharmaceutical crime
organised criminal network
network analysis
Measurement
law enforcement
Algorithm design and analysis
group identification
disruption strategies
Data mining
cyber criminals
criminal networks
criminal group structural organisation
criminal datasets
crime data
community structure
community analysis
bipartite network model
bipartite network
Artificial Intelligence
Analytical models
biblio
Reverse Engineering Digital Circuits Using Structural and Functional Analyses
Submitted by BrandonB on Wed, 05/06/2015 - 10:42am
reverse engineering
integrated circuit design
integrated circuits
intellectual property
invasive software
IP theft
IP violation detection
Logic gates
register files
Inference algorithms
SoC design
structural analysis
subtractors
system-on-chip
test circuits
Trojan horses
unstructured netlist
very large highly-optimized system-on-chip design
functional analysis
Algorithm design and analysis
algorithmic reverse engineering digital circuits
combinational elements
computer security
counters
design automation
Digital circuits
formal verification
adders
Globalization
globalized multivendor environment
Hardware
hardware trojans-malware
high-level netlist
ICs
industrial property