Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
novel clustering ensemble method
untrustworthy testing party
untrustworthy testing parties
Unsupervised Learning
trusted hardware Trojan detection framework
Trusted Computing
Trojan horses
trojan horse detection
testing stage
testing
robust hardware Trojan detection framework
pubcrawl
pattern clustering
novel clustering ensemble technique
Clustering algorithms
invasive software
integrated circuit testing
Integrated circuit modeling
IC
hardware Trojan detection
Hardware Security
Hardware
golden models-free hardware Trojan detection framework
fabrication process
fabrication
existing hardware Trojan detection
clustering ensemble
biblio
Exploiting Phase Information in Thermal Scans for Stealthy Trojan Detection
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
modulation
weak thermal hot spots
Trojan horses
trojan horse detection
Trojan detection
thermal scans
Thermal Mapping
Temperature measurement
stealthy hardware Trojan detection
pubcrawl
Phase measurement
phase information
Phase
amplitude analysis
measurement platform
Lock-in Thermography
invasive software
integrated circuits
infrared thermography
infrared signals
infrared imaging
Heating systems
Hardware
formidable alternative
detection method
biblio
A Novel Use of Approximate Circuits to Thwart Hardware Trojan Insertion and Provide Obfuscation
Submitted by grigby1 on Fri, 03/15/2019 - 11:58am
invasive software
Tunneling magnetoresistance
Trojan horses
trojan horse detection
Thwart Hardware Trojan insertion
Sensitivity
security of data
pubcrawl
prevention methods
original circuit
novel prevention technique
malicious modifications
logic circuits
ad-hoc design rules
integrated circuits
integrated circuit industry
Hardware Trojans
hardware trojan
Hardware
fabricated IC
error detection
critical circuits
Circuit faults
approximation
approximate logic circuit
biblio
Designing Subspecies of Hardware Trojans and Their Detection Using Neural Network Approach
Submitted by grigby1 on Fri, 03/15/2019 - 11:58am
learning (artificial intelligence)
true positive rate
Trojan horses
trojan horse detection
trigger circuits
TPR
third-party vendors
pubcrawl
outsourcing
neural-network based hardware-Trojan detection method
neural network approach
neural network
neural nets
machine-learning-based hardware-Trojan detection method
machine learning
Logic gates
Artificial Neural Networks
invasive software
integrated circuit design
high-performance hardware device
hardware trojan subspecies designing
hardware trojan
hardware devices mass-production
Hardware
gradient methods
gate-level netlist
feature extraction
electronic engineering computing
electric devices
Design Time
Benchmark testing
biblio
Grey Zone in Pre-Silicon Hardware Trojan Detection
Submitted by grigby1 on Fri, 03/15/2019 - 11:58am
invasive software
Trust-Hub
Trojan horses
trojan horse detection
Silicon
Si
pubcrawl
probability
pre-silicon hardware trojan detection method
Pre-Silicon Hardware Trojan Detection
machine learning
low signal probability
learning (artificial intelligence)
activation probability
integrated circuit testing
integrated circuit design
hardware Trojan benchmark circuits
Hardware
grey zone
functional test
elemental semiconductors
electronic engineering computing
benchmark
behaviour simulations
Behaviour Simulation
biblio
Concept of Smart Building Cyber-physical Systems Including Tamper Resistant Endpoints
Submitted by aekwall on Mon, 03/11/2019 - 10:37am
oAuth2.0
verification mechanism
update mechanisms
Trusted Platfrom Modules
trusted platform modules
Trusted Platform Module
Trusted Computing
TLS 1.3
tamper resistant endpoints
Software
smart buildings
smart building cyber-physical systems
security of data
secure communication channels
Resiliency
pubcrawl
composability
IT-security
IoT
Internet of Things
integrity measurement mechanisms
hardware-based security
Hardware
firmware
data integrity
cyber-physical systems
Cryptography
critical infrastructures
critical infrastructure
CPS devices
Containers
computer science
biblio
Trusted Platform Modules in Cyber-Physical Systems: On the Interference Between Security and Dependability
Submitted by aekwall on Mon, 03/11/2019 - 10:37am
Safety
Trusted Platfrom Modules
trusted platform modules
Trusted Platform Module
Trusted Computing
TPMs
tpm
system manipulation
Software
security of data
security mechanisms
security
secure elements
Availability
Resiliency
Reliability
Redundancy
pubcrawl
Industry 4.0
Hardware
embedded systems
dependability features
cyber-physical systems
cyber-attacks
cyber physical systems
composability
biblio
An Energy-Efficient Stochastic Computational Deep Belief Network
Submitted by grigby1 on Wed, 03/06/2019 - 4:29pm
random number generation
high energy consumption
Human behavior
learning (artificial intelligence)
Metrics
neural nets
Neurons
nonlinearly separable patterns
pattern classification
policy-based governance
pubcrawl
Hardware
random number generators
rectifier linear unit
resilience
Resiliency
RNGs
SC-DBN design
Scalability
Stochastic computing
Stochastic processes
DNNs
belief networks
Biological neural networks
Cognitive Computing
collaboration
composability
computation speed
Correlation
Deep Belief Network
deep neural networks
approximate SC activation unit
effective machine learning models
Electronic mail
energy consumption
energy-efficient deep belief network
energy-efficient stochastic computational deep belief network
fixed point arithmetic
fixed-point implementation
floating point arithmetic
floating-point design
biblio
Capture the RAT: Proximity-Based Attacks in 5G Using the Routine Activity Theory
Submitted by grigby1 on Wed, 03/06/2019 - 4:24pm
Resiliency
OMNET++
proactive security
proximity-based attack analysis
proximity-based cybercrime
pubcrawl
RAT
reactive solutions
resilience
high-level approach
routine activity theory
security
Security analysis
security problems
security software developers
Software
telecommunication security
5G cellular networks
Hardware
Device-to-device communication
critical IoT devices
CRAT
composability
cellular radio
Cellular networks
capillary network
autonomous vehicles
Autonomic Security
Analytical models
5G security
5G mobile communication
5G environments
5G devices
biblio
Autonomic Secure HPC Fabric Architecture
Submitted by grigby1 on Wed, 03/06/2019 - 4:24pm
HPC fabric architecture
Software
security of data
security management
security
resilient computing
Resiliency
resilience
pubcrawl
parallel processing
Omni-Path Fabric
anomaly analysis
High performance computing
Hardware
Frequency modulation
Fabrics
fabric industries
computer architecture
composability
Cloud Security
Cloud Computing
Autonomic Security
« first
‹ previous
…
43
44
45
46
47
48
49
50
51
…
next ›
last »