Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
circuit design
biblio
Mesh Based Obfuscation of Analog Circuit Properties
Submitted by aekwall on Mon, 11/09/2020 - 1:41pm
satisfiability modulo theory based algorithm
Design methodology
effective transistor dimensions
enhanced security
key based obfuscation technique
LC tank voltage-controlled oscillator
mesh topology
obfuscated circuitry
obfuscated transistors
obfuscation methodology
physical dimensions
SAT
circuit functionality
SMT
target frequency
transistor circuits
transistor sizes
Transistors
varactor transistor
Varactors
VCO
voltage amplitude
voltage-controlled oscillators
encryption key
Resiliency
pubcrawl
composability
policy-based governance
probability
Topology
reverse engineering
computability
operating frequency
Threshold voltage
Cryptography
circuit design
IP piracy
2×6 mesh structure
analog circuit properties
Analog circuits
analog obfuscation
analog satisfiability algorithm
aSAT algorithm
auto-determine
Brute Force Attack
biblio
Design and Realization of a Computer Security Control Circuit for Local Area Network
Submitted by aekwall on Mon, 05/04/2020 - 11:22am
control unit
Networked Control Systems Security
security threat
secure hard disk
ordinary hard disk
new technology challenge
network attack
management defect
local area network computer security control circuit
LAN security
LAN computers
LAN computer security control circuit
Hard disks
cyberattack
Circuit synthesis
circuit design
Predictive Metrics
security management
Local area networks
Information systems
composability
pubcrawl
Resiliency
information security
computer network security
biblio
"Circuit design to improve security of telecommunication devices"
Submitted by grigby1 on Tue, 02/14/2017 - 12:28pm
military forces
tunneling
TETRA
Telecommunication standards
telecommunication security
telecommunication devices
telecommunication device security
Telecommunication
SusTech
security
radio networks
radio equipment
pubcrawl170102
project 25
5G mobile communication
Iron
GSM
exclusive channel
encryption
economical circuit
Design Circuit
Cryptography
Conferences
coding
circuit design
attackers
Artificial Intelligence
accidental damage