Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
Hardware Implementation of Dynamic Key Value Based Stream Cipher Using Chaotic Logistic Map
Submitted by grigby1 on Tue, 10/08/2019 - 4:44pm
Random sequences
NIST statistical
nonrecursive key
private key cryptography
PRNG
pseudorandom number generation
pseudorandom sequence generation
pubcrawl
public key cryptography
random key generation
random number generation
Metrics
randomness tests
resilience
Resiliency
Scalability
stream cipher
symmetric key chaos based cryptography
Thermal analysis
Verilog HDL
X-power
Xilinx device
FPGA device
binary sequence
binary sequences
chaos
Chaos based cryptography
chaotic logistic map
Ciphers
dynamic key value based stream cipher
embedded systems
field programmable gate arrays
Field programmable gated array
asymmetric key chaos based cryptography
frequency 62.2 MHz
Hardware
Hardware Security
hardware-based embedded system
Human behavior
key scheduling
key stream
logistic map
Logistics
biblio
Repurposing SoC Analog Circuitry for Additional COTS Hardware Security
Submitted by grigby1 on Wed, 09/11/2019 - 2:44pm
repurposing SoC analog circuitry
Microelectronics Security
on-chip analog blocks
on-chip analog hardware blocks
physically unclonable function responses
processing algorithms
pubcrawl
PUF responses
reliable key generation
microcontrollers
resilience
Resiliency
security
Semiconductor device measurement
system-on-chip
temperature fluctuations
Temperature measurement
trusted microelectronics
Cryptography
additional COTS hardware security
analog to digital converters
analogue-digital conversion
commercial off-the-shelf system-on-a-chip integrated circuits
common COTS microcontroller
comparators
composability
COTS security
ADC
DAC
device authentication activities
digital to analog converters
digital-analogue conversion
encryption
Hardware
Hardware Security
Metrics
biblio
FPGA-oriented moving target defense against security threats from malicious FPGA tools
Submitted by aekwall on Mon, 09/09/2019 - 10:48am
FOMTD
Predictive Metrics
Xilinx
target defense
reverse engineering
moving target defense principle
malicious FPGA tools
hardware trojan
FPGA-oriented MTD method
FPGA users
FPGA security
FPGA hardware-software providers
FPGA emulation results
FPGA design suite
FPGA configuration
security of data
defense lines
moving target defense
Benchmark testing
Scalability
Hardware Security
security threats
Trojan horses
pubcrawl
Resiliency
Table lookup
security
Hardware
FPGA
field programmable gate arrays
biblio
Weak-Assert: A Weakness-Oriented Assertion Recommendation Toolkit for Program Analysis
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
program weakness
tools
testing
Syntactics
Software
security weaknesses
security
resilience
pubcrawl
assertion recommendation
program testing
policy-based governance
pattern matching
Metrics
Human behavior
Hardware
formal program verifcation
biblio
Zynq FPGA Based System Design for Video Surveillance with Sobel Edge Detection
Submitted by aekwall on Mon, 08/12/2019 - 9:46am
Surveillance systems and ARM processor
learning (artificial intelligence)
live traffic analysis
Metrics
pubcrawl
Reconfigurability
Resiliency
Scalability
security
Sobel edge detection
Streaming media
surveillance
input composite video surveillance
Thermal Imaging
VGA
video coding
video interface
video streaming
video surveillance
Xilinx ZC702 platfor
ZC702
Zynq FPGA based system design
Zynq-7000
field programmable gate arrays
analog composite video interface
analog CVBS
camera
Cameras
computer architecture
computer vision
Decoding
deep learning
deep video
edge detection
edge detection filter
ADAS
FPGA
Hardware
HDMI-MIPI CSI
high speed serial interfaces
image classification
Image edge detection
image filtering
Image resolution
industrial automation
input composite video decoding
biblio
Research and design of cryptography cloud framework
Submitted by aekwall on Mon, 08/05/2019 - 10:37am
cryptography resources
Virtualization
Resiliency
pubcrawl
Hardware
expandability
encryption
cryptography technology
cryptography services
cryptography service demand
Ciphers
cryptography cloud framework
cryptography cloud
Cryptography
composability
cloud environment
cloud cryptography service
cloud cryptography machine
cloud computing mode
Cloud Computing
biblio
KLRA: A Kernel Level Resource Auditing Tool For IoT Operating System Security
Submitted by grigby1 on Mon, 07/01/2019 - 10:03am
operating system kernels
tools
Task Analysis
self-adaptive heuristic security mechanism
security of data
security issues
Security Audits
security
Scalability
resource-sensitive events
resource auditor
Resiliency
resilience
pubcrawl
Operating systems security
KLRA
kernel level resource auditing tool
kernel level
Kernel
IoT operating system security
iot operating system
IoT device
Internet of Things
Human Factors
Human behavior
Hardware
data privacy
biblio
Evaluating the effects of cyber-attacks on cyber physical systems using a hardware-in-the-loop simulation testbed
Submitted by willirn1 on Fri, 05/31/2019 - 10:41am
resilience
hardware-in-the-loop simulation testbed
HIL testbed
model based software development framework
Model Integrated Computing
physical components
physical system
platform specific performance measurements
railway transportation system
hardware-in-the-loop
security of data
simulation environment
Software
software engineering
system functions
testbed
Vanderbilt
vulnerability assessment
cyber-attack effect evaluation
actuation capability
Analytical models
Computational modeling
computer architecture
computer security
CPS attack experiments
cyber components
cyber physical systems
System-security co-design
cyber-physical system
cyber-physical systems
cybersecurity design process
embedded computers
embedded systems
Experimentation
Hardware
hardware-in-the loop simulation
biblio
Property Specific Information Flow Analysis for Hardware Security Verification
Submitted by grigby1 on Mon, 05/20/2019 - 4:30pm
Scalability
Metrics
policy-based governance
potential security violations
property specific information flow analysis
property specific search
property specific trimming technique
pubcrawl
resilience
Resiliency
Mathematical model
security
security critical paths
security model
security of data
security property
security verification
timing
Trojan horses
unintended design flaws
hardware security verification
collaboration
Complexity theory
composability
Control Theory
Design methodology
formal verification
Hardware
hardware information flow analysis
Hardware Security
Acceleration
hardware security vulnerabilities
Hardware Trojans
Human behavior
Human Factors
information flow analysis
information flow models
information flow security
information theoretic security
biblio
Penetration Testing for Internet of Things and Its Automation
Submitted by aekwall on Mon, 05/20/2019 - 9:57am
machine to machine technologies
traditional internet
Systems Security
security problems
security of data
RFID
Resiliency
radiofrequency identification
radio frequency identification
pubcrawl
penetration testing approach
Penetration Testing
Metrics
automation
IoT Security 2018
IoT security
IoT
Internet of Things
internet
Human behavior
Hardware
GPS
composability
belief-desire-intention (BDI) model
belief-desire-intention
BDI model
« first
‹ previous
…
41
42
43
44
45
46
47
48
49
…
next ›
last »