Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
UP2DATE: Safe and secure over-the-air software updates on high-performance mixed-criticality systems
Submitted by aekwall on Tue, 04/27/2021 - 1:15pm
security
Safety
Hardware
Software
computer architecture
pubcrawl
testing
contracts
Heterogeneous computing
Availability
composability
mixed-criticality
OTASU
biblio
CIED - rapid composability of rack scale resources using Capability Inference Engine across Datacenters
Submitted by aekwall on Tue, 04/27/2021 - 1:14pm
Servers
Hardware
security
pubcrawl
temperature
data privacy
Production facilities
composability
converged infrastructure
datacenter
Datacenter automation
Wiring
biblio
Deep Learning-Based Image Analysis Framework for Hardware Assurance of Digital Integrated Circuits
Submitted by grigby1 on Fri, 04/09/2021 - 11:22am
pubcrawl
Image analysis
Information Assurance
Integrated circuit modeling
integrated circuits
learning (artificial intelligence)
machine learning
Metrics
policy-based governance
Human behavior
resilience
Resiliency
Scalability
Scanning Electron Microscope images
SEM images
semiautomated training data preparation methods
Task Analysis
Analytical models
hardware information examination and verification
hardware information
Hardware Assurance
Hardware
feature extraction
essential analysis steps
electronic engineering computing
DL-based methods
digital integrated circuits
digital ICs
digital IC
deep learning
composability
collaboration
Artificial Intelligence (AI)
biblio
A Hardware Implementation of the SHA2 Hash Algorithms Using CMOS 28nm Technology
Submitted by aekwall on Mon, 03/29/2021 - 12:06pm
Hardware Implementation
SHA2 Hash algorithms
SHA-256
secure hash algorithm 2
hardware hash accelerator
CMOS 28nm technology
hash algorithms
Hash functions
adders
field programmable gate arrays
Compositionality
pubcrawl
CMOS technology
CMOS integrated circuits
Resiliency
Program processors
Hardware
Cryptography
biblio
Trusted Boot for Embedded Systems Using Hypothesis Testing Benchmark
Submitted by grigby1 on Mon, 03/29/2021 - 12:02pm
Metrics
Trusted Computing
trusted boot
Time measurement
security of data
security
Resiliency
resilience
pubcrawl
Benchmark testing
measurement uncertainty
malware
hypothesis testing benchmark
Hardware
embedded systems
Embedded System
composability
boot sequence
biblio
Research of MQTT, CoAP, HTTP and XMPP IoT Communication protocols for Embedded Systems
Submitted by grigby1 on Mon, 03/29/2021 - 11:57am
Metrics
XMPP IoT communication protocols
XMPP
transport protocols
Software
security
Resiliency
resilience
pubcrawl
Protocols
protocol
Power demand
popular IoT protocols
MQTT
advantage
IoT protocol
IoT
Internet of Things
HTTP
hardware stage
Hardware
Esp32
embedded systems
Embedded System
different IoT protocols
composability
CoAP
biblio
A Holistic Approach to Cyber Physical Systems Security and Resilience
Submitted by grigby1 on Mon, 03/29/2021 - 11:57am
software assurance
resilience
Resiliency
Resilient Systems
Risk
SAE G-32 Cyber Physical Systems Security Committee
secure systems
security
security of data
Software
pubcrawl
standards
supply chains
system integrators
system security
system security considerations
systems engineering
threats
Trustworthy Systems
Vulnerability
firmware assurance
affordable systems
composability
computer security
cyber
cyber physical system security framework
cyber weaknesses
cyber-physical systems
cybersecurity.
embedded systems
CPS resilience
global supply chain
Hardware
Hardware Assurance
holistic approach
holistic systems engineering approach
Industries
Metrics
Mission Assurance
biblio
A Formal Model for the Automatic Configuration of Access Protection Units in MPSoC-Based Embedded Systems
Submitted by grigby1 on Mon, 03/29/2021 - 11:56am
Resiliency
MPSoC-based embedded systems
multiple processing cores
multiprocessing systems
multiprocessor system-on-chip
on-chip isolation
pubcrawl
real-time systems
resilience
model-based design
Safety
safety-critical embedded system
safety-critical software
security
security-critical embedded system
system-level isolation
system-on-chip
timing
dedicated access protection units
access permissions
access protection
access protection unit
authorisation
Code Generation
composability
configuration code
Data protection
abstract permission declarations
embedded systems
formal model
Hardware
heterogeneous system-on-chip platforms
information flow requirements
information flow tracking
internal communication links
Metrics
biblio
Nested Pipeline Hardware Self-Organizing Map for High Dimensional Vectors
Submitted by aekwall on Mon, 03/22/2021 - 1:10pm
neural net architecture
fully parallel computation
high dimensional vectors
homogeneous modular structure
low-dimensional vectors
multiple clocks
nested architecture
nested pipeline hardware self-organizing map
neural chips
frequency 60.0 MHz
operable clock frequency
original nested SOM
pipeline computation
Self-Organizing Map
sequential computation
single vector
VHDL
weight vector update
Pipelines
FPGA
Hardware
computer architecture
Resiliency
pubcrawl
Neurons
clustering
Vectors
field programmable gate arrays
expandability
Compositionality
Clocks
pipeline processing
MNIST
self-organising feature maps
Self-organizing feature maps
biblio
An effective technique preventing differential cryptanalysis attack
Submitted by grigby1 on Wed, 03/17/2021 - 12:42pm
Adaptive scan chain
Chained Attacks
traditional scan chain
plaintexts differs
plaintext analysis technique
plaintext analysis module
plaintext analysis circuit
differential cryptanalysis attack
different scan chain
design for testability
controller circuit
complicated scan chain
adaptive scan chain structure
adaptive scan chain circuit
Logic gates
Hardware Security
Watermarking
Switches
Registers
Scalability
integrated circuit testing
Mathematical model
AES
Hardware
Resiliency
resilience
pubcrawl
Cryptography
« first
‹ previous
…
23
24
25
26
27
28
29
30
31
…
next ›
last »