Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
network on chip security
biblio
Analysis of Black Hole Router Attack in Network-on-Chip
Submitted by grigby1 on Mon, 03/23/2020 - 4:15pm
Resiliency
Multiprocessors System-on-Chip
network-on-chip
network on chip security
NoC
outsourcing
outsourcing design
Packet loss
processing cores
pubcrawl
resilience
multiprocessing systems
Router Systems Security
Scalability
security
security attacks
sensitive information
System performance
telecommunication network routing
Trojan horses
very strong violent attack
Hardware
BHR attack
Black Hole Router attack
black holes
Blak Hole
communication platform
computer network security
data packets
denial of service attack
Denial-of-Service
DoS.
BHR
hardware trojan
HT
HT model
infected node
Integrated circuit modeling
invasive software
malicious Hardware Trojan
malicious nodes
Metrics
biblio
Routing Aware and Runtime Detection for Infected Network-on-Chip Routers
Submitted by grigby1 on Mon, 11/04/2019 - 12:39pm
NoC
Trojan horses
system-on-chip
System recovery
security attacks
security
secure routing algorithm
secret key leaking
runtime detection
Runtime
Routing
Router Systems Security
Resiliency
resilience
pubcrawl
outsourcing
network on chip security
network-on-chip architecture
network-on-chip
network routing
Multiprocessors System-on-Chip
multiprocessing systems
MPSoC
Metrics
Malicious-tolerant Routing Algorithm
malicious Hardware Trojans
logic design
invasive software
integrated circuits
hardware trojan
Hardware
biblio
Chip-Based symmetric and asymmetric key generation in hierarchical wireless sensors networks
Submitted by grigby1 on Mon, 06/11/2018 - 3:24pm
key connectivity
asymmetric key distribution technique
asymmetric key generation
attack resilience
chip-based symmetric key generation
commodity hardware
data freshness
Hierarchical Wireless Sensor Networks
hierarchical wireless sensors networks
authenticity
Key Distribution
Key Pre-distribution
Pair-wise
security requirement
symmetric key distribution technique
tpm
Trusted Platform Module
network on chip security
wireless sensor networks
pubcrawl
Resiliency
Scalability
asymmetric key cryptography
Symmetric Key Cryptography
public key cryptography
Conferences
control systems
security
WSN
private key cryptography
resilience
integrity
Metrics
physical attacks
confidentiality
biblio
dRMT: Disaggregated Programmable Switching
Submitted by grigby1 on Mon, 06/11/2018 - 3:24pm
pubcrawl
Resiliency
Scalability
resilience
Metrics
disagreggation
packet processing
Programmable switching
RMT
network on chip security
biblio
Persistent Spread Measurement for Big Network Data Based on Register Intersection
Submitted by grigby1 on Mon, 06/11/2018 - 3:24pm
network security
pubcrawl
Resiliency
Scalability
resilience
Metrics
big network data
network traffic measurement
persistent spread measurement
network on chip security
biblio
Minimum energy quantized neural networks
Submitted by grigby1 on Mon, 06/11/2018 - 3:24pm
iso-accuracy depending
automated minimum-energy optimization
BinaryNets
complex arithmetic
fixed point arithmetic
fundamental trade-off
generic hardware platform
higher precision operators
int4 implementations
int8 networks
arbitrary fixed point precision
low precision weights
Minimum Energy
minimum energy QNN
QNN training
Quantized Neural Network
quantized neural networks
wider network architectures
network on chip security
resilience
Resiliency
Scalability
Hardware
neural nets
energy consumption
telecommunication security
Neural networks
Training
deep learning
pubcrawl
Memory management
Metrics
Random access memory
system-on-chip
energy conservation
power aware computing
Mobile communication
approximate computing
biblio
A security-aware routing implementation for dynamic data protection in zone-based MPSoC
Submitted by grigby1 on Mon, 06/11/2018 - 3:24pm
multiprocessing systems
network on chip security
Zones
security-aware routing
network-on-chip routing
network routing
multiprocessor system-on-chip
MPSoC
Encapsulation
asymmetrical security zones
Firewalls (computing)
Runtime
NoC
Routing protocols
Metrics
resilience
Routing
IP networks
Data protection
network-on-chip
Scalability
Resiliency
pubcrawl
security
biblio
Study of secure boot with a FPGA-based IoT device
Submitted by grigby1 on Mon, 06/11/2018 - 3:23pm
bitstream decoding
network on chip security
Xilinx Zynq-7000 Series System-on-Chip ZC706 prototype board
Trojan Horse attacks
software-based security implementation
Secure Boot
IoT system
infrastructure components
host processor computation power
FPGA-based IoT device
FPGA design
FPGA bitstream
encrypt system boot image
effective security provisioning
critical components
pubcrawl
system-on-chip
Decoding
Metrics
resilience
system security
field programmable gate arrays
Trojan horses
authentication
encryption
Cryptography
Internet of Things
Scalability
Resiliency
biblio
Scan chain based IP fingerprint and identification
Submitted by grigby1 on Mon, 06/11/2018 - 3:23pm
intellectual property
Silicon
security
scan chain
Scalability
Resiliency
resilience
pubcrawl
network on chip security
Metrics
ip protection
IP networks
IP identification
IP fingerprint
copy protection
integrated circuits
integrated circuit design
industrial property
identification technology
IC identification
fingerprinting techniques
Fingerprint recognition
fault coverage
fabrication
digital fingerprinting
digital fingerprint
delays
biblio
Packet Leak Detection on Hardware-Trojan Infected NoCs for MPSoC Systems
Submitted by grigby1 on Mon, 06/11/2018 - 3:23pm
pubcrawl
Resiliency
Scalability
resilience
Metrics
hardware trojan
network-on-chip
Packet leak detection
network on chip security
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »