Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
In-Memory Nearest Neighbor Search with FeFET Multi-Bit Content-Addressable Memories
Submitted by grigby1 on Tue, 03/08/2022 - 2:52pm
pubcrawl
Software
Hardware
delays
Metrics
Measurement
Task Analysis
nearest neighbor search
Hamming distance
Nearest neighbor methods
content-addressable memory
ferroelectric FET
multi-bit design
biblio
Multi-band Analysis for Enhancing Multiple Combined Fault Diagnosis
Submitted by aekwall on Tue, 03/08/2022 - 2:37pm
wavelet transform
Wavelet packets
Rotors
Resiliency
pubcrawl
multiple fault diagnosis
Metrics
Induction motors
induction motor
Human Factors
Harmonic analysis
Hardware
fault location
fault diagnosis
cyber-physical systems
compound fault
biblio
Trustworthy Computing on Untrustworthy and Trojan-Infected on-Chip Interconnects
Submitted by grigby1 on Tue, 03/01/2022 - 4:19pm
Metrics
tagging
system-on-chip
Software
Scalability
Resiliency
resilience
pubcrawl
network on chip security
Trustworthy Systems
IP networks
Hardware Trust
Hardware Security
Hardware
Focusing
Europe
design for security
composability
biblio
Lightweight Encryption Using Chaffing and Winnowing with All-or-Nothing Transform for Network-on-Chip Architectures
Submitted by grigby1 on Tue, 03/01/2022 - 4:18pm
composability
eavesdropping
encryption
Hardware
intellectual property
Metrics
network on chip security
network-on-chip
pubcrawl
resilience
Resiliency
Scalability
security
system-on-chip
Transforms
biblio
Securing Network-on-Chips via Novel Anonymous Routing
Submitted by grigby1 on Tue, 03/01/2022 - 4:18pm
Proposals
Trojan horses
system-on-chips
Source Routing
security
Scalability
Routing
Resiliency
resilience
pubcrawl
anonymous routing
Network-on-Chips
network-on-chip
network on chip security
Metrics
hardware trojan
Hardware
Cryptography
Costs
composability
biblio
An Effective Technology for Secured Data Auditing for Cloud Computing using Fuzzy Biometric Method
Submitted by aekwall on Fri, 02/25/2022 - 10:45am
Control Theory
resilience
biometrics (access control)
Cloud Computing
Compositionality
data integrity
Hardware
passwords
Predictive Metrics
provable security
pubcrawl
Resiliency
security
Servers
biblio
Cryptocurrencies with Security Policies and Two-Factor Authentication
Submitted by grigby1 on Thu, 02/24/2022 - 12:20pm
two factor authentication
authentication
Banking
blockchain
blockchains
Costs
cryptocurrencies
Cryptography
Hardware
Human behavior
performance evaluation
Privacy Policies
pubcrawl
Scalability
smart contracts
biblio
An I/O Separation Model for Formal Verification of Kernel Implementations
Submitted by grigby1 on Thu, 02/24/2022 - 12:19pm
i-o systems security
access control and authorization
authorization
Computational modeling
computer architecture
Hardware
Human behavior
I/O separation
performance evaluation
privacy
Privacy Policies
pubcrawl
Scalability
security
Security architectures
Trustworthy Computing
biblio
MT-MTD: Muti-Training based Moving Target Defense Trojaning Attack in Edged-AI network
Submitted by grigby1 on Tue, 02/22/2022 - 5:45pm
Trojaning attack
Edged-AI
moving target defense
Image edge detection
Deep Neural Network
simulation
Games
Scalability
Hardware
Conferences
Resiliency
resilience
Metrics
pubcrawl
Training
deep learning
biblio
SAIF: Automated Asset Identification for Security Verification at the Register Transfer Level
Submitted by aekwall on Tue, 02/22/2022 - 2:16pm
Measurement and Metrics Testing
vulnerability assessment
security verification.
Security Metrics
security assets
Solid modeling
Very large scale integration
Registers
Metrics
pubcrawl
Analytical models
Hardware
Measurement
Benchmark testing
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »