Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
Implementation of Lightweight Cryptography Core PRESENT and DM-PRESENT on FPGA
Submitted by aekwall on Fri, 03/03/2023 - 10:58am
Registers
Lightweight Ciphers
PRESENT
lightweight hash function
lightweight block cipher
DM-PRESENT
lightweight cryptography
cyber-physical systems
Power demand
field programmable gate arrays
Ciphers
Hash functions
Resiliency
Scalability
pubcrawl
Internet of Things
Hardware
biblio
SecSoC: A Secure System on Chip Architecture for IoT Devices
Submitted by grigby1 on Tue, 02/28/2023 - 5:50pm
integrated circuits
secure processor
secure architecture
reduced instruction set computing
hardware decryption
security management
hardware encryption
operating systems
Hardware Security
composability
computer architecture
IoT security
performance evaluation
Hardware
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Proposal of an extended CYPHONIC adapter supporting general nodes using virtual IPv6 addresses
Submitted by grigby1 on Fri, 02/24/2023 - 5:31pm
Prototypes
Zero-trust security
Overlay network protocol
dual-stack
CYPHONIC
overlay networks
IPv6
Waste materials
Policy Based Governance
composability
Internet of Things
Hardware
Throughput
Resiliency
resilience
Metrics
pubcrawl
IP networks
security
collaboration
biblio
The transitional phase of Boost.Asio and POCO C++ networking libraries towards IPv6 and IoT networking security
Submitted by grigby1 on Fri, 02/24/2023 - 5:30pm
C++ languages
POCO
Internet Protocol version 6 (IPv6)
Internet Protocol Security (IPsec)
C++ networking libraries
Boost.Asio
codes
Internet of Things (IoT)
IPv6
operating systems
Policy Based Governance
collaboration
programming
Libraries
composability
Protocols
Hardware
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Partial Reconfiguration for Run-time Memory Faults and Hardware Trojan Attacks Detection
Submitted by grigby1 on Fri, 02/17/2023 - 5:17pm
real-time systems
Memory
Fault
scalable verification
Costs
detection
Hardware Trojans
Compositionality
Memory management
pubcrawl
Prototypes
Scalability
system-on-chip
Hardware
Throughput
Resiliency
resilience
Metrics
biblio
Hardware-Based Randomized Encoding for Sensor Authentication in Power Grid SCADA Systems
Submitted by grigby1 on Fri, 02/17/2023 - 5:14pm
pubcrawl
resilience
Resiliency
Software
Hardware
Hardware Security
authentication
integrated circuits
SCADA systems
Compositionality
power grids
Sensor Systems
False Data Injection
SCADA Systems Security
Power Grid
biblio
System on Chip (SoC) Security Architecture Framework for Isolated Domains Against Threats
Submitted by grigby1 on Fri, 02/17/2023 - 5:10pm
secure system
SoC
isolated domains
arm
policy governance
sandboxing
Embedded System
threats
embedded systems
Robustness
computer architecture
side-channel attacks
composability
system-on-chip
Safety
security
Hardware
pubcrawl
collaboration
biblio
Runtime Detection of Time-Delay Security Attack in System-an-Chip
Submitted by aekwall on Fri, 02/17/2023 - 10:44am
Trojan horses
Hardware
quality of service
real-time systems
pubcrawl
Resiliency
Power demand
Predictive Metrics
Runtime
System performance
Router Systems Security
Hardware Trojan (HT)
Network-on-Chip (NoC)
System-on-Chip(SoC)
biblio
Combination of ROP Defense Mechanisms for Better Safety and Security in Embedded Systems
Submitted by aekwall on Fri, 02/17/2023 - 10:40am
Safety
Xtensa
Control flow integ-rity
arm
digital systems
rop attacks
return-oriented programming
codes
Program processors
embedded systems
composability
Resiliency
Scalability
pubcrawl
Human Factors
Software
Hardware
biblio
A Review on Behavioural Biometric Authentication
Submitted by grigby1 on Fri, 02/03/2023 - 5:10pm
keystroke
Support vector machines
Scalability
Resiliency
resilience
pubcrawl
Pattern recognition
pattern locks
Mice
keystroke dynamics
keystroke analysis
human characteristics
Human behavior
Hardware
gait
footstep pressure
biometrics
Behavioral sciences
Behavioral
authentication
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »