Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
Tutorial T4: All You Need to Know about Hardware Trojans and Counterfeit ICs
Submitted by BrandonB on Wed, 05/06/2015 - 11:35am
hardware-software codesign
Very large scale integration
vertical business model
Tutorials
Trojan horses
system integrity
original IC designs
life-critical systems
invasive software
integrated circuit testing
horizontal business model
Awards activities
Hardware Trojans
Hardware
electronic component supply chain
Educational institutions
counterfeit prevention
counterfeit IC
counterfeit electronic parts
counterfeit detection
Conferences
biblio
Slack removal for enhanced reliability and trust
Submitted by BrandonB on Wed, 05/06/2015 - 11:34am
Small Delay Defects
mission-critical application
pattern count
reliability enhancement
security of data
security vulnerabilities
security-critical application
slack removal
Slacks
malicious circuitries
test quality
testing
timing slacks
transition fault patterns
Trojan horses
trust enhancement
Wires
fabrication
care bit density intact
Circuit faults
delay defect detection
delay defects
delay unit insertion
delays
design for testability
design technique
At-speed Testing
Hardware
hardware trojan
Hardware Trojans
integrated circuit reliability
logic circuits
Logic gates
logic testing
biblio
Hardware trojan detection by symmetry breaking in path delays
Submitted by BrandonB on Wed, 05/06/2015 - 11:33am
inter-and intra-die variations
Trojan horses
Transistors
symmetry breaking
symmetric paths
subcircuit consistencies
side channel methods
Sensitivity
path delays
path delay
Logic gates
invasive software
benchmark circuits
integrated circuits
IC
HT
hardware Trojan detection
hardware trojan
Hardware
electronic engineering computing
detect modifications
delays
circuit symmetries
biblio
Detection of hardware Trojan in SEA using path delay
Submitted by BrandonB on Wed, 05/06/2015 - 11:33am
HTH detection and insertion
Trojan horses
Trojan circuits
SEA crypto
scalable encryption algorithm crypto
Scalable Encryption Algorithm (SEA)
payload Trojan detection rate
payload Trojan
path delay
Logic gates
logic circuits
layout level Trojan insertions
IP blocks
invasive software
Algorithm design and analysis
hardware Trojan horses insertion
Hardware Trojan horses (HTH)
hardware Trojan detection
Hardware
GDSII hard macros
GDSII
gate level Trojan insertions
fabless design house
encryption
delays
Cryptography
ASIC design flow
application specific integrated circuits
biblio
Towards a hardware Trojan detection methodology
Submitted by BrandonB on Wed, 05/06/2015 - 11:31am
delays
detection techniques
Hardware
Integrated circuit modeling
integrated circuits
Power demand
security hardware Trojans horses
Trojan horses
trusted hardware
Vectors
biblio
Programmable management framework for evolved SDN
Submitted by BrandonB on Wed, 05/06/2015 - 9:56am
OSGI
telecommunication network management
software-defined networking
software radio
Software
security
SDN philosophy
SDN networks
SDN manager
SDN architecture
SDN
Protocols
programmable management framework
PDEE
autonomic network management
on-the-fly code update
network management
management functions
IP networks
Hardware
FIPA
evolved SDN
distributed execution environment
control systems
computer architecture
codes
code lifecycle management
bottom-up approach
biblio
A hybrid lossless and lossy compression scheme for streaming RGB-D data in real time
Submitted by BrandonB on Tue, 05/05/2015 - 12:39pm
streaming
red-green-blue-depth data
rescue robots
response robot
RGB images
RGB-D cameras
RGB-D data streaming
robot vision
robots
Servers
point cloud
tethers
Three-dimensional displays
urban search and rescue
USAR
USAR operations
video
video streaming
Wireless communication
wireless radio
disaster environment
3D depth data capture
aerial robots
aerospace robotics
Cameras
Compression
Computers
computing power requirements
data compression
data throughput
3D
Hardware
Image coding
image colour analysis
live streaming
lossless compression scheme
lossy compression scheme
low-power embedded computing equipment
Microsoft Kinect
mobile robots
biblio
Ontology based approach for perception of network security state
Submitted by BrandonB on Tue, 05/05/2015 - 12:08pm
automation
computer network security
computer networks
Hardware
Manuals
network operating system
network operating systems
Network Security Status
Network Situational awareness
Ontologies
ontologies (artificial intelligence)
Ontology
security
taxonomy
taxonomy classes
biblio
Prevention of multiple spoofing attacks with dynamic MAC address allocation for wireless networks
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
MAC Spoofing attacks
wireless networks
Wireless Network Security
Wireless communication
telecommunication security
spoofing attack detection
received signal strength
radio networks
Monitoring
MD5 hashing
Accuracy
Hardware
EPAM clustering
enhanced partitioning around medoid
Electronic mail
dynamic MAC address allocation
Cryptography
Broadcasting
Attacks Detection and Prevention
biblio
Cyber Maneuvers and Maneuver Keys
Submitted by BrandonB on Tue, 05/05/2015 - 11:20am
computer security
Cryptography
cyber maneuvers
cyber security system
encryption
encryption algorithm
Hardware
Intrusion Detection
Jamming
maneuver keys
moving-target defenses
proactive network change
proactive strategy
reactive network change
secure rekeying
spread-spectrum key
« first
‹ previous
…
58
59
60
61
62
63
64
65
66
next ›
last »