Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network on chip
biblio
On-line Detection and Localization of DoS Attacks in NoC
Submitted by aekwall on Thu, 09/30/2021 - 10:43am
security
Trojan horses
Hardware Trojans
Hardware
system-on-chip
Internet of Things
real-time systems
pubcrawl
Scalability
Metrics
Resiliency
random forests
denial of service
network on chip
random forest algorithm
network on chip security
biblio
Test methodology for detecting short-channel faults in network on- chip networks using IOT
Submitted by grigby1 on Fri, 05/15/2020 - 11:44am
integrated circuit reliability
short-channel fault detection
Routing
routers networks
Power demand
NoC
network-on-chip analysis machine
network-on-chip
network routing
network on- chip networks
network on chip
Monitoring
IoT
Internet of Things
interconnection networks
integrated circuit testing
network on chip security
Integrated circuit interconnections
fault diagnosis
Encoders/decoders
Data Security
Data protection
data encryption
Cryptography
Conferences
computing-intensive data processing
computer architecture
Aerospace electronics
Metrics
Resiliency
resilience
Scalability
biblio
A Diffusional Schedule for Traffic Reducing on Network-on-Chip
Submitted by grigby1 on Fri, 05/15/2020 - 11:29am
Schedules
network on chip
network-on-chip
NoC activities
parallel processing
parallel task execution
power aware computing
Protocols
remote data access
long-distance data synchronization
scheduling
synchronisation
Synchronization
Task Analysis
task mapping algorithm
task schedule
task traffic reduction
traffic distribution
diffusional schedule
network on chip security
Scalability
Resiliency
resilience
Metrics
application-layer optimization
Coherence
diffusional pattern
pubcrawl
energy consumption
energy efficient task schedule
energy saving
energy.
inefficient task schedule strategy
latency
latency reduction
Load modeling
biblio
A flexible system-on-a-chip implementation of the Advanced Encryption Standard
Submitted by grigby1 on Thu, 04/20/2017 - 11:41am
network on chip
Xilinx Zynq 7000
system-on-chip
System-on-a-chip
symmetric encryption
standards
security
Scalability
resource usage
Resiliency
Registers
pubcrawl
processor
peripheral interfaces
network security
network on chip security
advanced encryption standard
hardware-software approach
flexible system-on-a-chip
flexible interface
field programmable gate arrays
encryption algorithm
encryption
Cryptography
composability
complex electronic systems
Clocks
cipher block chaining mode
CBC
AES
advanced peripheral bus
biblio
A high speed implementation counter mode cryptography using hardware parallelism
Submitted by grigby1 on Thu, 04/20/2017 - 11:41am
parallel computing
hardware parallelism
Heracles toolkit
high speed implementation counter mode cryptography
network-on-chip
network on chip
Network on Chip(NoC)
network on chip security
NoC
graphics processing units
pubcrawl
Resiliency
Scalability
secure data transmission
security mechanisms
Software algorithms
unsecured networks
DES
Big Data
composability
Counter Mode Cryptography (CTR)
CPU
Cryptography
CTR
data encryption standard core
Data Encryption Standard (DES)
Algorithm design and analysis
encryption
field programmable gate arrays
FPGA
FPGA board
gpu
Grafic Process Unite(GPU)
graphics processing unit
biblio
Analog cellular neural network for application in physical unclonable functions
Submitted by grigby1 on Thu, 04/20/2017 - 11:41am
Resiliency
Monte Carlo simulation
network on chip
network on chip security
neural chips
Physically Unclonable Function (PUF)
physical unclonable function design
process variation
pubcrawl
PUF instances
Monte Carlo methods
Scalability
secret key generation
Semiconductor device modeling
size 45 nm
Trajectory
unclonable core module
unpolarized Gaussian-shaped distribution
word length 100 bit
CMOS technology
analogue circuits
cellular neural nets
Cellular Neural Network (CNN)
Cellular neural networks
challenge-response security system
circuit dynamical behavior
CMOS analogue integrated circuits
CMOS integrated circuits
analog cellular neural network
composability
Cryptography
device identification-authentication
Hamming distance
Hardware
Hardware Security
integrated circuit design
Integrated circuit modeling
biblio
A system-level security approach for heterogeneous MPSoCs
Submitted by grigby1 on Thu, 04/20/2017 - 11:41am
system-level security approach
Scalability
security
Access Control
complex embedded systems
composability
shared IP
direct memory access
dynamic permissions configuration
embedded systems
Hardware
heterogeneous execution platforms
heterogeneous hardware platforms
heterogeneous MPSoC
shared libraries
Resiliency
IP networks
isolation
memory access
memory transactions
multiprocessing systems
multiprocessor
network on chip
network on chip security
Program processors
prototype isolation unit
pubcrawl
system-on-chip
real-time systems
biblio
FPGA based hardware implementation of AES Rijndael algorithm for Encryption and Decryption
Submitted by grigby1 on Thu, 04/20/2017 - 11:40am
secure data transmission
Inverse S-Box transformations
network on chip
network on chip security
network security algorithm
pre-calculated look-up tables
precalculated LUT
pubcrawl
Resiliency
Rijndael
Scalability
inverse mix-columns transformations
Table lookup
timing
Verilog-HDL
Virtex-7 XC7VX690T chip
wired digital communication networks
wireless digital communication networks
Xilinx ISE Design Suite-14.7 Tool
Xilinx Virtex-7 FPGA
Xilinx XPower Analyzer
decryption
AES-128
AES-192
AES-256
AES Rijndael algorithm
Algorithm design and analysis
algorithmic functions
Clocks
composability
Cryptography
advanced encryption standard (AES)
encryption
Field Programmable Gate Array (FPGA)
field programmable gate arrays
FPGA based hardware implementation
Galois field multiplications
Galois fields
GF (28)
Hardware Description Language (HDL)
hardware description languages
biblio
Hardware security assurance in emerging IoT applications
Submitted by grigby1 on Thu, 04/20/2017 - 11:40am
IoT connected devices
Trojan horses
thwart hardware Trojan attack
side-channel analysis attack
Security Assurance
Scalability
Resiliency
Radiation detectors
pubcrawl
network on chip security
network on chip
network-on-chip
low-cost dynamic permutation method
IoT processing unit
accumulated partial guessing entropy
invasive software
Internet-of-Things (IoT)
Internet of Things
hardware trojan
hardware security assurance
Hardware Security
hardware attacks
Hardware
Cryptography
computation power
composability
Cisco
biblio
Hardware Security Threats and Potential Countermeasures in Emerging 3D ICs
Submitted by grigby1 on Thu, 04/20/2017 - 11:40am
3D ICs
composability
Hardware Security
network on chip
network on chip security
network-on-chip
pubcrawl
Resiliency
Scalability
trojan horse detection
1
2
next ›
last »