Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
NIST
biblio
A subthreshold 30pJ/bit self-timed ring based true random number generator for internet of everything
Submitted by grigby1 on Mon, 06/11/2018 - 3:48pm
resilience
Noise
oscillator
Oscillators
physics based entropy source
pubcrawl
PVT variation
random number generation
random number generator
NIST SP 800-22 statistical tests
Resiliency
Ring oscillators
security
size 180.0 nm
statistical testing
subthreshold self-timed ring
true random number generator (TRNG)
Internet of Everything
CMOS flash process
composability
Cryptography
Entropy
FIPS 140-2
Generators
high quality random bit sequences
integrated circuit design
CMOS analogue integrated circuits
Internet of Things
inverter based ring oscillator
Jitter
Logic gates
Metrics
Microelectronics Security
NIST
biblio
A Novel Hybrid Delay Based Physical Unclonable Function Immune to Machine Learning Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
Monitoring
wireless sensor networks
Temperature sensors
Temperature measurement
Temperature distribution
Scalability
Ring oscillators
Resiliency
resilience
pubcrawl
NIST
Adversary Models
Modeling Attacks
Metrics
Hybrid PUF
Humidity
Human behavior
Hardware Security
FPGA
arbiter PUF
Agriculture
biblio
Novel normalization technique for chaotic Pseudo-random number generators based on semi-implicit ODE solvers
Submitted by grigby1 on Wed, 12/27/2017 - 1:08pm
Resiliency
normalization technique
numerical integration
numerical simulation
numerical solution
probability
pseudo-random number generator
pseudorandom binary sequence generator
pubcrawl
random number generation
Random sequences
normalization factor
Rössler attractors
Rössler system
semi-implicit ODE solver
semiimplicit ODE solvers
semiimplicit symmetric composition D-method
state variables values
statistical testing
Thomas attractor
Thomas attractors
correlation analysis methods
chaotic communication
chaotic cryptography
chaotic differential equations
chaotic ODEs
chaotic pseudorandom number generators
chaotic system
composability
Correlation
Correlation analysis
chaos
differential equations
dynamical chaos
generation process
generator architecture
Generators
Metrics
NIST
NIST statistical test suite
nonlinear control systems
biblio
Comparative study of two pseudo chaotic number generators for securing the IoT
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
pubcrawl
NIST
nonlinear functions
nonlinear recursive filters
PCNG2
piece-wise linear chaotic map
piecewise linear techniques
PRNGs
pseudo chaotic number generators
network security applications
PWLCmap
random number generation
recursive filters
Resiliency
second pseudo chaotic number generator
Skew Tent map
STmap
generation time
Bit rate
chaotic communication
chaotic cryptography
Ciphers
composability
coupled chaotic maps
cryptographically strong pseudo random number generators
Cryptography
binary diffusion matrix
Generators
Informatics
information security
Internet of Things
IoT
logistic map
Metrics
biblio
Cyber security threats \#x2014; Smart grid infrastructure
Submitted by grigby1 on Mon, 11/27/2017 - 12:25pm
security of data
prosumer
Protocols
pubcrawl
R and D
Resiliency
risk evaluation process
SCADA
secure cyber infrastructure
power system security
smart devices
smart grid infrastructure
Smart Grids
smart meters
smart power grids
smart power system
Software
WANs
ICT
computer security
cyber infrastructure
cyber security
cyber security threats
cyber-attack
Demand response (DR)
denial-of-service (DoS)
electronic devices
composability
ICT driven power equipment massively layered structure
Metrics
new generation sensors
NIST
Peak Load Management (PLM)
power grid vulnerability analysis
power system framework
file
Industry Perspective on CPS
Submitted by egriffor on Mon, 08/07/2017 - 12:50pm
Testing
Validation and Verification
Foundations
NIST
Industry CPS
CPS collaborations
Session 2
Session 2
2017
Presentation
biblio
Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
ABAC
Access Control
Algorithms
complexity
computer security
graph theory
insider
insider threat
Network reconnaissance
NGAC
NIST
policy machine
pubcrawl
Resiliency
simultaneous instantiation
XACML
biblio
SCAP benchmark for Cisco router security configuration compliance
Submitted by grigby1 on Mon, 03/13/2017 - 12:23pm
OVAL
XCCDF
vulnerability measurement
security of data
security content automation protocol
security compliance
security automation
security
SCAP benchmark
policy compliance evaluation
Science of Security
operating systems
NIST
information security management
Formal Specification
Cisco router security configuration compliance
business data processing
Benchmark testing
automation
pubcrawl
biblio
Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
NIST randomness test
telecommunication security
symmetric-key cryptographic operations
Security analysis
RFID tags
randomness test
random number generation
radiofrequency identification
pubcrawl170112
polynomials
NIST SP800-22
cryptanalysis
NIST
low-cost RFID tags
lightweight pseudorandom number generators
lightweight PRNG
LFSR-based PRNG security
international RFID standards
Generators
EPC Gen2 tags
EPC Gen2 RFID tag
Cryptography
biblio
"Random number generation based on sensor with decimation method"
Submitted by grigby1 on Thu, 02/23/2017 - 12:39pm
pubcrawl
wash-rinse-spin approach
testing random number
sensor fusion
sensor data
security
Random sequences
random sequence
random number uniform distribution
random number independence
random number generation
adversarial control
privacy
NIST
minimizing correlation
internet
Generators
decimation method
data privacy
Cryptography
cryptographic mechanisms
Correlation
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »