Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
error detection
biblio
MILR: Mathematically Induced Layer Recovery for Plaintext Space Error Correction of CNNs
Submitted by grigby1 on Fri, 10/28/2022 - 3:17pm
error correction
encryption
pubcrawl
resilience
Resiliency
Software
Hardware
Elliptic curve cryptography
Robustness
neural network
Mission critical systems
convolutional neural networks
error detection
Error Recovery
neural network resiliency
biblio
Error Detection And Correction In TCAMS Based SRAM
Submitted by grigby1 on Fri, 09/16/2022 - 3:53pm
signal processing
security
pubcrawl
Metrics
FPGA
Production
composability
Memory management
Redundancy
Market research
Random access memory
forward error correction
SRAM
Resiliency
error correction
error detection
biblio
Towards Protection Mechanisms for Secure and Efficient CAN Operation
Submitted by aekwall on Mon, 09/21/2020 - 2:46pm
efficient CAN operation
security solutions
controller area networks
CAN bus
access controller
automotive security
broadband services
CAN data-link layer
CAN Security
Clocks
fault confinement mechanism
iterative research
message priority
numerous proposed solutions
protection mechanisms
real-time message deliverability
secure CAN operation
confinement
Protocols
Automotive engineering
computer network security
telecommunication traffic
authorisation
real-time systems
Resiliency
pubcrawl
composability
automobiles
Industry 4.0
privacy
authentication
Cyber Attacks
cyber-physical systems
error detection
timing
biblio
Design and Implementation of Secure and Encoded Data Transmission Using Turbo Codes
Submitted by aekwall on Mon, 06/15/2020 - 10:01am
Maximum log-map algorithm
Viterbi algorithm
Turbo Encoder
Turbo Decoder
turbo codes
text encoding
text decoding
telecommunication security
Shannonlimit
secure data transmission
Resiliency
Recursive systematic convolutional encoder
pubcrawl
parity check codes
noisy data
Metrics
channel capacity
Maximum likelihood decoding
iterative decoding
Interleaver
image encoding
image decoding
Image coding
forward error correction method
forward error correction
error detection
error correction codes
encoded data transmission
deinterleaver
Decoding
Convolutional codes
composability
biblio
Resilient Reorder Buffer Design for Network-on-Chip
Submitted by grigby1 on Fri, 03/27/2020 - 10:27am
Reorder Buffer
Network interfaces
network-on-chip
Network-on-Chip Advanced eXtensible Interface Network Interface block
parallel processing
policy-based governance
pubcrawl
random control logic
Registers
Metrics
resilience
Resiliency
resilient Reorder buffer design
Safe Coding
safe control logic design
safe ROB design
Safety
Table lookup
fault tolerance
buffer circuits
collaboration
control logic function
Diagnostic Coverage requirement
error correction codes
error detection
error detection code
error detection codes
area efficient safe design techniques
Fault tolerant systems
high performance computing systems
Human behavior
Human Factors
Industries
integrated circuit design
invariance checking
logic design
biblio
Checkpoints Assignment on Cyber-Physical Digital Microfluidic Biochips for Early Detection of Hardware Trojans
Submitted by grigby1 on Wed, 02/26/2020 - 3:37pm
Resiliency
Hardware
hardware trojan
hardware Trojans attacks
invasive software
Lab-on-a-Chip
Microfluidics
piracy attacks
pubcrawl
resilience
frequent diseases detection
security
security concern
security study
Sequential analysis
supply chain security
tools
trojan horse detection
Trojan horses
cyber-physical digital microfluidic biochips
biochip design flow
biochips
biological techniques
bioprotocol manipulation attacks
checkpoint
checkpointing
checkpoints assignment
Computer crime
cyber physical systems
biochemical analysis
cyber-physical systems
denial-of-service attacks
digital microfluidic biochip
diseases
DMF biochip
Electrodes
error detection
error-recovery sensing systems
biblio
Attack Modeling and Verification for Connected System Security
Submitted by aekwall on Wed, 05/01/2019 - 12:05pm
SysML connectivity profile
pubcrawl
Resiliency
security
security of data
Software Architecture
software tools
static system modeling
SysML
program verification
system security specifications
system specifications
system validation
system verification
systems engineering
Systems modeling
Temporal Logic
Unified modeling language
error propagation
Attack Modeling
composability
connected system security
critical systems
dynamic system modeling
Dynamical Systems
embedded systems
error detection
Adaptation models
extended attack tree
Formal Specification
IoT
Metrics
model checker
model checking
Petri nets
program diagnostics
biblio
A Novel Use of Approximate Circuits to Thwart Hardware Trojan Insertion and Provide Obfuscation
Submitted by grigby1 on Fri, 03/15/2019 - 10:58am
invasive software
Tunneling magnetoresistance
Trojan horses
trojan horse detection
Thwart Hardware Trojan insertion
Sensitivity
security of data
pubcrawl
prevention methods
original circuit
novel prevention technique
malicious modifications
logic circuits
ad-hoc design rules
integrated circuits
integrated circuit industry
Hardware Trojans
hardware trojan
Hardware
fabricated IC
error detection
critical circuits
Circuit faults
approximation
approximate logic circuit
biblio
Hardening AES Hardware Implementations Against Fault and Error Inject Attacks
Submitted by grigby1 on Thu, 02/14/2019 - 10:18am
coding theory
security
AES
error correction
error detection
Human Factors
Metrics
non-linearity
pubcrawl
robust codes
Scalability
Tamper resistance
biblio
Participant Authenticating, Error Detecting, and 100% Multiple Errors Repairing Chang-Chen-Wang's Secret Sharing Method Enhancement
Submitted by K_Hooper on Wed, 10/25/2017 - 10:53am
authentication
cover image
Damage Assessment
error detection
pubcrawl
repairing
resilience
secret image
secret sharing
Steganography
1
2
next ›
last »