Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber physical systems
biblio
Integrating Trusted Platform Modules in Power Electronics
Submitted by grigby1 on Mon, 11/08/2021 - 1:44pm
resilience
trusted platform modules
Trusted Platform Module
tpm
Software
Servers
security
Secure storage
Resiliency
pubcrawl
Hardware
encryption
cyber-physical systems
cyber-physical system
cyber physical systems
cyber physical security
composability
biblio
A TPCM-Based Trusted PXE Boot Method For Servers
Submitted by grigby1 on Mon, 11/08/2021 - 1:44pm
resilience
trusted startup
trusted platform modules
Trusted Platform Module
trusted platform control module
Trusted Computing
standards
Servers
security
Resiliency
pubcrawl
Publishing
Microprogramming
Linux
level measurement
information security
cyber physical systems
cyber physical security
composability
biblio
Macros for Coding Information Encryption Amp; Decryption in Trusted Platform Module
Submitted by grigby1 on Mon, 11/08/2021 - 1:43pm
Industrial engineering
trusted platform modules
Trusted Platform Module
standards
security
Resiliency
resilience
Registers
Program processors
OS Windows Security
macros
pubcrawl
GOST
encryption
DES
decryption
Decoding Assembly Language
cyber physical systems
cyber physical security
composability
Ciphers
AES
biblio
Detecting Trojan Attacks on Deep Neural Networks
Submitted by grigby1 on Mon, 11/08/2021 - 1:37pm
pubcrawl
Trojan horses
trojan horse detection
trojan
Training
supply chain security
Strips
Resiliency
resilience
composability
Predictive models
Prediction algorithms
neural network
deep learning
Data models
cyber physical systems
cyber physical security
Computational modeling
biblio
Detection of Trojan Based DoS Attacks on RSA Cryptosystem Using Hybrid Supervised Learning Models
Submitted by grigby1 on Mon, 11/08/2021 - 1:36pm
machine learning algorithms
Trojan horses
trojan horse detection
supply chain security
security
RSA
Resiliency
resilience
pubcrawl
Power profile
chipwhisperer
machine learning
Integrated circuit modeling
hardware Trojan horses
Hardware
Data models
cyber physical systems
cyber physical security
Cryptography
composability
biblio
IR-Drop Calibration for Hardware Trojan Detection
Submitted by grigby1 on Mon, 11/08/2021 - 1:36pm
process deviation
Voltage measurement
Trojan horses
trojan horse detection
supply chain security
Semiconductor device measurement
Ring Oscillator
Resiliency
resilience
pubcrawl
composability
Power supplies
IR-drop
Integrated circuit modeling
hardware trojan
Hardware
Frequency measurement
cyber physical systems
cyber physical security
biblio
A Novel Golden-Chip-Free Clustering Technique Using Backscattering Side Channel for Hardware Trojan Detection
Submitted by grigby1 on Mon, 11/08/2021 - 1:36pm
pubcrawl
Trojan horses
trojan horse detection
Trojan detection
supply chain security
Statistics
Sociology
reverse engineering
Resiliency
resilience
backscatter
integrated circuits
hardware trojan
Hardware Security
Hardware
cyber physical systems
cyber physical security
composability
clustering
Backscattering side-channel
biblio
Hardware Trojan Detection Based on SRC
Submitted by grigby1 on Mon, 11/08/2021 - 1:35pm
resilience
Trojan horses
trojan horse detection
Training
supply chain security
sparse representation-based classifier (SRC)
Size measurement
security
Resiliency
composability
pubcrawl
Noise measurement
machine learning
integrated circuits
hardware trojan
Hardware
cyber physical systems
cyber physical security
biblio
Hardware Trojan Detection Method Based on the Frequency Domain Characteristics of Power Consumption
Submitted by grigby1 on Mon, 11/08/2021 - 1:35pm
Hardware
Trojan horses
trojan horse detection
time-domain analysis
supply chain security
resilience
pubcrawl
Power demand
power analysis
Mahalanobis distance
Integrated circuit modeling
hardware trojan
Time Frequency Analysis and Security
frequency-domain analysis
Fourier transform
encryption
cyber physical systems
cyber physical security
composability
AES encryption circuit
Scalability
Predictive Metrics
Resiliency
biblio
Hardware Trojans Detection Based on BP Neural Network
Submitted by grigby1 on Mon, 11/08/2021 - 1:35pm
Power demand
Trojan horses
trojan horse detection
supply chain security
standards
side channel analysis
Resiliency
resilience
pubcrawl
Backpropagation
Neural networks
hardware trojan
Hardware
encryption
cyber physical systems
cyber physical security
composability
BP Neural Network
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »