Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
Hardware Trojans Detection at Register Transfer Level Based on Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 4:37pm
Libraries
Trojan horses
trojan horse detection
training database
Training
supply chain security
source code (software)
shift registers
server-client mechanism
RTL source codes
Resiliency
resilience
register transfer level
pubcrawl
machine-learning-based detection method
circuit features extraction
learning (artificial intelligence)
invasive software
integrated circuits design process
Integrated circuit modeling
integrated circuit design
Hardware Trojans library
Hardware Trojans detection
Hardware
flip-flops
feature extraction
electronic engineering computing
database management systems
cyber physical systems
biblio
Checkpoints Assignment on Cyber-Physical Digital Microfluidic Biochips for Early Detection of Hardware Trojans
Submitted by grigby1 on Wed, 02/26/2020 - 4:37pm
Resiliency
Hardware
hardware trojan
hardware Trojans attacks
invasive software
Lab-on-a-Chip
Microfluidics
piracy attacks
pubcrawl
resilience
frequent diseases detection
security
security concern
security study
Sequential analysis
supply chain security
tools
trojan horse detection
Trojan horses
cyber-physical digital microfluidic biochips
biochip design flow
biochips
biological techniques
bioprotocol manipulation attacks
checkpoint
checkpointing
checkpoints assignment
Computer crime
cyber physical systems
biochemical analysis
cyber-physical systems
denial-of-service attacks
digital microfluidic biochip
diseases
DMF biochip
Electrodes
error detection
error-recovery sensing systems
biblio
FIXER: Flow Integrity Extensions for Embedded RISC-V
Submitted by aekwall on Mon, 02/24/2020 - 11:01am
integrated Rocket Custom Coprocessor
program compilers
security framework
RISC-V
buffer overflow
Code injection
coprocessors
fine-grained control-flow integrity
FIXER
flow integrity extensions for embedded RISC-V
return oriented programming
low-power embedded devices
open source architecture
RISC-V architecture
RISC-V processor core
RISC-V SoC platform
RISC-V toolchains
Rockets
security extension
shadow stack
Buffer overflows
Scalability
Internet of Things
data integrity
Hardware
security
embedded systems
reduced instruction set computing
system-on-chip
computer architecture
security of data
Resiliency
pubcrawl
composability
software reusability
Software Architecture
Bars
Human Factors
code reuse attacks
ROP
biblio
An Efficient Memory Zeroization Technique Under Side-Channel Attacks
Submitted by aekwall on Mon, 02/24/2020 - 10:55am
built-in self test
volatile memories
side-channel attacks
Side-channel attack
security violations
secured data content
secret data
random-access storage
private memory contents
on-chip memory contents
Memory Zeroization
memory security
memory built-in-self-test hardware
MBIST based content zeroization approach
efficient memory zeroization technique
content protection
security of data
Temperature sensors
cryptographic keys
remanence
Compositionality
Engines
Random access memory
data deletion
security attacks
pubcrawl
Resiliency
system-on-chip
security
Memory management
Hardware
Cryptography
biblio
Self-Healing Approach for Hardware Neural Network Architecture
Submitted by grigby1 on Mon, 02/17/2020 - 5:12pm
hardware nodes
VHDL
Training
spare node
self-healing networks
self-healing approach results
self-healing
Resiliency
resilience
Redundancy
pubcrawl
Neurons
neural net architecture
neural chips
neighbor node
modest area overhead
Altira 10 GX FPGA
hardware neural Network architecture
hardware description languages
Hardware
field programmable gate arrays
faulty node
Fault-tolerant
fault tolerant computing
fault detection
Evolvable hardware
Embryonic hardware
current self-healing neural network
composability
complex neural network
Biological neural networks
artificial neural network
biblio
Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives
Submitted by grigby1 on Mon, 02/17/2020 - 5:07pm
microsoft windows
vulnerabilities
standards
SSD
solid state drives
Software
security weaknesses
security guarantees
reverse engineering
Resiliency
resilience
pubcrawl
policy-based governance
peripheral interfaces
password
bitlocker
Metrics
internal models
Human behavior
hardware-encryption
hardware full-disk encryption
Hardware
flash memories
firmware
external models
encryption software
encryption
Data protection
Cryptography
critical security weaknesses
biblio
Enhanced Uptime and Firmware Cybersecurity for Grid-Connected Power Electronics
Submitted by aekwall on Mon, 02/17/2020 - 2:22pm
hardware-assisted monitor
distributed energy resource prototype
embedded Linux
encrypted serial communication
firmware cybersecurity
firmware integrity
firmware run-time integrity security
firmware run-time security feature
firmware updating
Grid Security
grid-connected power electronics
digital signal processors
Heart beat
multi-mission controls
operational technology security
power electronics security
power electronics uptime
power flow
run-time security
security techniques
uptime
firmware
Monitoring
Hardware
security
Linux
Resiliency
pubcrawl
composability
Metrics
Cybersecurity
privacy
security of data
power engineering computing
power system security
control systems
power grids
signal processing security
digital signal processing chips
Microprogramming
power electronics
security features
biblio
Secure Edge Computing with Lightweight Control-Flow Property-based Attestation
Submitted by aekwall on Mon, 02/10/2020 - 12:11pm
security
operational assurance
Protocols
Remote Attestation
remote device
resource-constrained edge services
run-time modifications
Scalability
secure edge computing
lightweight dynamic control-flow property-based attestation architecture
security mechanisms
security of data
Software
software assurance
software integrity
software-based attacks
Trusted Component
critical software components
pubcrawl
Human behavior
Resiliency
attack landscape
Cloud Computing
cloud devices
composability
Control-Flow Property-based Attestation
attestation
decentralized solution
defense mechanism
device-integrity
Hardware
industrial IoT applications
intelligent edge computing systems
Internet of Things
biblio
Client-Side Verification Framework for Offline Architecture of IoT
Submitted by aekwall on Mon, 02/10/2020 - 12:07pm
sensors
Smart Grid Sensors
smart grid system
smart garbage collection
offline architecture
client-side verification framework
IoT systems
XML
Compositionality
smart cities
indexing
storage management
Network
Human Factors
IoT
Smart homes
Urban areas
energy consumption
Web servers
Smart Grids
pubcrawl
Resiliency
mobile computing
security
Hardware
Internet of Things
Conferences
computer network security
biblio
CSPoweR-Watch: A Cyber-Resilient Residential Power Management System
Submitted by aekwall on Mon, 02/10/2020 - 12:06pm
pubcrawl
Intrusion Detection
learning (artificial intelligence)
library call lists
machine learning model
malicious activity
malicious actors
modern energy management systems
performance evaluation
power electronics
PowerWatch
Internet-connected resources
Resiliency
security of data
smart energy management system
Smart Grid
Smart Grid Sensors
Smart Grids
smart power grids
smart-grid
system call tracing
vital information
energy management
bogus sensor data
Compositionality
Computer crime
critical firmware
CSPoweR-Watch
CSPR
cyber-resilient residential power management system
cyber-secure power router
Cyber-security
EMS
Router Systems Security
energy management system (EMS)
energy management systems
energy resources
functional versions
global energy consumption
Hardware
Human Factors
Information analysis
internet
« first
‹ previous
…
37
38
39
40
41
42
43
44
45
…
next ›
last »