Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
Tamper resistance of IoT devices against electromagnnetic analysis
Submitted by grigby1 on Mon, 11/20/2017 - 12:27pm
Internet of Things
Tamper resistance
SIMECK
security of IoT device
Resiliency
resilience
pubcrawl
lightweight block ciphers
lightweight block cipher
IoT devices
Ciphers
Hardware Security
Hardware
FPGA
field programmable gate arrays
electromagnetic waves
Electromagnetic scattering
electromagnetic analysis
Cryptography
composability
biblio
Security of software defined networks: Taxonomic modeling, key components and open research area
Submitted by grigby1 on Mon, 11/20/2017 - 12:20pm
Resiliency
network management
network operators
network specification
networking like routing
open research area
Policy
policy-based governance
program debugging
pubcrawl
low-level device configuration
SDN architectural layers-interfaces
SDN architecture
security solutions
simulation framework
software defined network security
software defined networking
state distribution
taxonomic modeling
thematic taxonomy
cyber-attacks
Artificial Neural Networks
Cloud Watcher
collaboration
Companies
computer architecture
Computer crime
computer network management
computer network security
control systems
artificial neural network
debugging
digital simulation
digital threats
FORTNOX
FRESCO
Governance
Government
Hardware
L-IDs
biblio
Two-way real time multimedia stream authentication using physical unclonable functions
Submitted by grigby1 on Mon, 11/20/2017 - 12:04pm
Multimedia Signal Processing
Xilinx
video surveillance
telecommunication security
Streaming media
signal processing
Resiliency
Receivers
real-time systems
pubcrawl
physical unclonable functions
multimedia stream authentication
authentication
Multimedia communication
Metrics
media streaming
license/key management
Human Factors
Human behavior
hardware-based security
Hardware
FPGA
Digital rights management
biblio
Detecting and thwarting hardware trojan attacks in cyber-physical systems
Submitted by grigby1 on Mon, 11/13/2017 - 12:00pm
thwarting hardware trojan attacks
Resiliency
security
security measures
smart grid application
Software component
software security
software-only attack
supervisory module
third-party soft IP cores
Reliability
Trojan horses
trust
trust enhancements
trust metric
trust specifications
Trusted Computing
trusted platform modules
verification
Hardware
composability
counter-measure
cyber-physical system integrity
cyber-physical systems
design
Diagnostics
Embedded System
field programmable gate arrays
attack vector models
hardware component
hardware security platform
hardware-only attack
invasive software
IP networks
isolated security primitives
Measurement
pubcrawl
biblio
TLS with trustworthy certificate authorities
Submitted by grigby1 on Mon, 11/13/2017 - 11:59am
Resiliency
web services
trustworthy certificate authority
trustworthy certificate authorities
trusted platform modules
Trusted Platform Module
Trusted Computing
trust policies
TLS-based authentication mechanisms
TLS
TaoCA
Servers
authorisation
public key cryptography
pubcrawl
Hardware
Cryptography
cryptographic attestations
composability
cloud-based trustworthy Web services
cloud platforms
Cloud Computing
certificate authorities
Browsers
biblio
SDSM: Fast and scalable security support for directory-based distributed shared memory
Submitted by grigby1 on Fri, 11/03/2017 - 11:30am
public clouds
single-threaded applications
shared memory
security of data
security layer
security
secure parallel applications
secure CPU architectures
SDSM
Scalable Security
Scalability
Radiation detectors
Coherence
pubcrawl
parallel computation
hardware approach
Hardware
encryption
Electrical Engineering
DSM
distributed shared memory systems
distributed computation
directory-based distributed shared memory systems
directory
biblio
Defense Systems and IoT: Security Issues in an Era of Distributed Command and Control
Submitted by grigby1 on Wed, 05/17/2017 - 1:33pm
chips
counterfeit
counterfeit threats
defense systems
electronics
Hardware
hardware vulnerabilities
integrating supply chain and technical data
IoT
pubcrawl
quantifying risk of counterfeits
Resiliency
supply chain for electronic parts
supply chain risk assessment
supply chain security
testing of electronic chips
biblio
Analog cellular neural network for application in physical unclonable functions
Submitted by grigby1 on Thu, 04/20/2017 - 12:41pm
Resiliency
Monte Carlo simulation
network on chip
network on chip security
neural chips
Physically Unclonable Function (PUF)
physical unclonable function design
process variation
pubcrawl
PUF instances
Monte Carlo methods
Scalability
secret key generation
Semiconductor device modeling
size 45 nm
Trajectory
unclonable core module
unpolarized Gaussian-shaped distribution
word length 100 bit
CMOS technology
analogue circuits
cellular neural nets
Cellular Neural Network (CNN)
Cellular neural networks
challenge-response security system
circuit dynamical behavior
CMOS analogue integrated circuits
CMOS integrated circuits
analog cellular neural network
composability
Cryptography
device identification-authentication
Hamming distance
Hardware
Hardware Security
integrated circuit design
Integrated circuit modeling
biblio
A system-level security approach for heterogeneous MPSoCs
Submitted by grigby1 on Thu, 04/20/2017 - 12:41pm
system-level security approach
Scalability
security
Access Control
complex embedded systems
composability
shared IP
direct memory access
dynamic permissions configuration
embedded systems
Hardware
heterogeneous execution platforms
heterogeneous hardware platforms
heterogeneous MPSoC
shared libraries
Resiliency
IP networks
isolation
memory access
memory transactions
multiprocessing systems
multiprocessor
network on chip
network on chip security
Program processors
prototype isolation unit
pubcrawl
system-on-chip
real-time systems
biblio
Hardware security assurance in emerging IoT applications
Submitted by grigby1 on Thu, 04/20/2017 - 12:40pm
IoT connected devices
Trojan horses
thwart hardware Trojan attack
side-channel analysis attack
Security Assurance
Scalability
Resiliency
Radiation detectors
pubcrawl
network on chip security
network on chip
network-on-chip
low-cost dynamic permutation method
IoT processing unit
accumulated partial guessing entropy
invasive software
Internet-of-Things (IoT)
Internet of Things
hardware trojan
hardware security assurance
Hardware Security
hardware attacks
Hardware
Cryptography
computation power
composability
Cisco
« first
‹ previous
…
55
56
57
58
59
60
61
62
63
…
next ›
last »