Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Multiplexing
biblio
Can Multi-Layer Microfluidic Design Methods Aid Bio-Intellectual Property Protection?
Submitted by grigby1 on Thu, 07/30/2020 - 12:48pm
biointellectual property protection
ip protection
skilled person-hour investment
significant fiscal person-hour investment
Product design
Multiplexing
multilayer microfluidic design methods
Mixers
Microfluidics
Lab-on-a-Chip
intellectual property rights
Foundries
biotechnology
bioMEMS
pubcrawl
bioassay implementation
bioassay developer
Three-dimensional displays
reverse engineering
Valves
Layout
Nonhomogeneous media
composability
industrial property
Resiliency
resilience
policy-based governance
biblio
A Modeling Attack Resistant Deception Technique for Securing PUF based Authentication
Submitted by grigby1 on Fri, 06/19/2020 - 10:49am
mutual authentication
Servers
Scalability
resource-rich server authentication
Resistance
Resiliency
resilience
replay attacks
Registers
PUF-based authentication method
pubcrawl
Protocols
Policy-Governed Secure Collaboration
policy-based governance
physical unclonable function-based authentication protocol
physical unclonable function (PUF)
active deception protocol
Multiplexing
ML attack
machine learning attacks
learning (artificial intelligence)
Generators
false trust
false PUF multiplexing
Cryptographic Protocols
challenge response pairs
Buildings
binary channel
authentication protocol
authentication
authentic CRP
attack resistant deception technique
biblio
Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks
Submitted by grigby1 on Fri, 05/15/2020 - 10:36am
Resiliency
virtual ports
virtual port numbers
virtual IPs
virtual IP addresses
Synchronization
Static Network
Software-Defined Networks
software-defined networking-based MTD technique
software defined networking
Servers
scanning attacks
Scalability
RHSM
attack success probability
resilience
Reconnaissance
random IP addresses
random host and service multiplexing technique
pubcrawl
proactive defense mechanism
Network reconnaissance
Multiplexing
MTD technique
IP networks
control systems
computer network security
biblio
Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks
Submitted by grigby1 on Tue, 02/18/2020 - 11:05am
security
performance trade-offs
Probes
Protocols
pubcrawl
realistic evaluation
Reconnaissance
resilience
Resiliency
Scalability
performance overhead
security benefit
security techniques
Servers
Software Defined Network
software defined networking
Software Defined Networks
virtualisation
virtualised network
Moving Target Defence
comparison techniques
computer network security
Damage Assessment
flexible random virtual IP multiplexing
frequent address mutation
FRVM
IP multiplexing moving target defence
IP networks
Metrics
Analytical models
moving target defence technique
moving target defense
MTD techniques
Multiplexing
network attacks
network configurations
Network reconnaissance
Performance
biblio
SDN-Based IP Shuffling Moving Target Defense with Multiple SDN Controllers
Submitted by aekwall on Mon, 09/09/2019 - 9:49am
SDN security
control systems
Controller dependency
delays
Distributed SDN controller
IP networks
moving target defense
Multiplexing
Predictive Metrics
pubcrawl
Resiliency
Scalability
security
software-defined networking
biblio
On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)
Submitted by grigby1 on Mon, 12/10/2018 - 10:33am
random geometric graph
IoT technology
Management
Mathematical model
military communication
military computing
military operations
multiplex networks
Multiplexing
optimisation
paradigm shift
Poisson point process
pubcrawl
IoT networks
reconfigurable IoBT networks
reconfigurable multilayer network design
resilience
Resiliency
Scalability
secure IoBT networks
security of data
smart cities
Smart homes
Stochastic processes
Wireless communication
critical information dissemination
automated systems
Battlefield
battlefield resources
battlefield specific challenges
battlefields
changing mission requirements
combat efficiency
combat equipment
Communication networks
control
coordinated automated decisions
coordinated decision-making
Ad hoc networks
Cyber-physical attacks
Decision Making
Epidemics
Geometry
health care
heterogeneous network devices
Human Factors
information dissemination
Internet of battlefield things
Internet of Things
iobt
biblio
Trojan-Feature Extraction at Gate-Level Netlists and Its Application to Hardware-Trojan Detection Using Random Forest Classifier
Submitted by grigby1 on Wed, 04/11/2018 - 2:00pm
Logic gates
TrustHUB benchmarks
Trojan-feature extraction
Trojan nets
Trojan horses
trojan horse detection
Resiliency
resilience
random forest classifier
Random Forest
pubcrawl
normal nets
Multiplexing
malicious third-party vendors
machine-learning based hardware Trojan classifier
machine learning
Benchmark testing
learning (artificial intelligence)
invasive software
integrated circuits
integrated circuit design
IC design process
hardware-Trojan infected nets
hardware-Trojan detection
hardware trojan
Hardware
gate-level netlists
gate-level netlist
feature extraction
F-measure
cyber physical systems
composability
biblio
Trustworthy reconfigurable access to on-chip infrastructure
Submitted by grigby1 on Fri, 02/02/2018 - 12:29pm
security
reconfigurable scan network
reconfigurable scan networks
Registers
Resiliency
RSN
scan pattern generation method
secure DFT
secure pattern retargeting
pubcrawl
security problem
system-on-chip
trustworthiness
trustworthy access pattern generation
trustworthy access sequences
trustworthy data transmission
trustworthy reconfigurable access
Trustworthy Systems
IEEE Std 1500
composability
cyber physical systems
data communication
embedded systems
external interfaces
Hardware Security
IEEE standards
IEEE Std 1149
access mechanisms
IEEE Std 1687
IJTAG
Instruments
integrated circuit testing
JTAG
Latches
Multiplexing
on-chip embedded infrastructure
biblio
"Interference-floor shaping for liquid coverage zones in coordinated 5G networks"
Submitted by grigby1 on Tue, 02/21/2017 - 11:16am
destructive superposition
Time-frequency Analysis
pubcrawl170103
Multiplexing
liquid coverage zones
joint transmission coordinated multipoint
interference-floor shaping
Interference
Geometry
5G mobile communication
coordinated 5G networks
CoMP
channel prediction
Channel estimation
channel components
antennas
adjacent channel interference
biblio
An efficient diagnosis method to deal with multiple fault-pairs simultaneously using a single circuit model
Submitted by BrandonB on Wed, 05/06/2015 - 1:32pm
Integrated circuit modeling
stuck-at faults
single circuit model
nonequivalent-fault pairs
Multiplexing
multi-pair diagnosis
Logic gates
IWLS'05 benchmark circuit
ISCAS'89 benchmark circuit
automatic test pattern generation
fault pairs diagnosis
Fault injection
fault diagnosis
diagnosis-aware ATPG method
diagnosis pattern generation
Circuit faults
Central Processing Unit
« first
‹ previous
1
2