Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern locks
biblio
Design Obfuscation versus Test
Submitted by aekwall on Mon, 10/04/2021 - 1:54pm
pubcrawl
Scalability
Resiliency
Human behavior
automatic test pattern generation
high level synthesis
integrated circuit design
logic locking
logic obfuscation
test
pattern locks
biblio
Is Register Transfer Level Locking Secure?
Submitted by aekwall on Mon, 10/04/2021 - 1:53pm
integrated circuits
Logic gates
security
Hardware
pubcrawl
Scalability
Resiliency
Human behavior
Registers
Foundries
Layout
pattern locks
biblio
Capturing and Obscuring Ping-Pong Patterns to Mitigate Continuous Attacks
Submitted by aekwall on Mon, 10/04/2021 - 1:53pm
security
Software
pubcrawl
Scalability
Resiliency
Human behavior
Probes
side-channel attacks
Data mining
Multicore processing
computer architecture
ping-pong regulator
Regulators
side channel attacks
pattern locks
biblio
ATPG-Guided Fault Injection Attacks on Logic Locking
Submitted by aekwall on Mon, 10/04/2021 - 1:53pm
Human behavior
pattern locks
semiconductor lasers
logic locking
laser theory
IP piracy
IC overproduction
Fault injection
differential fault analysis
Logic gates
Resiliency
Scalability
pubcrawl
resilience
tools
Circuit faults
security
biblio
Latch-Based Logic Locking
Submitted by aekwall on Mon, 10/04/2021 - 1:53pm
Clocks
delays
Human behavior
Integrated circuit modeling
Latches
Logic gates
pattern locks
propagation delay
pubcrawl
Resiliency
Scalability
security
biblio
Entropy based Security Rating Evaluation Scheme for Pattern Lock
Submitted by aekwall on Mon, 10/04/2021 - 1:52pm
security
password
visualization
authentication
pubcrawl
Scalability
Resiliency
Human behavior
Entropy
smart phones
Sun
pattern locks
biblio
Securing Asynchronous Exceptions
Submitted by aekwall on Mon, 03/15/2021 - 12:09pm
Libraries
Theorem Proving
telecommunication security
Synchronization
security of data
security
Runtime system
Runtime
pubcrawl
programming language semantics
programming
program verification
program invariants
program diagnostics
program compilers
Metrics
pattern locks
language-based information-flow control techniques
language constructs
Instruction sets
IFC language
features asynchronous exceptions
different covert channels
data structures
Concurrent computing
concurrency control
Compositionality
compiler security
Resiliency
Scalability
Human behavior
biblio
Brain-Computer Interface based User Authentication System for Personal Device Security
Submitted by grigby1 on Tue, 03/09/2021 - 3:03pm
recurrent neural network
mentally selected circle
mentally uttered number
Metrics
particle filter
password
personal device security
PF
pubcrawl
recurrent neural nets
Kalman filters
resilience
RNN
security
security of data
SSVEP brain pattern
two stage security verification
user authentication system
visual evoked potentials
brain-computer interface system
Human behavior
Scalability
Resiliency
3 × 3 spatial matrix
BCI
biometric security
BIOS
brain
brain pattern classification
pattern locks
brain-computer interfaces
CCA
EKF
electroencephalography
EMD
ERNN
extended-Kalman filter
flickering circle
biblio
Machine Learning Models for Activity Recognition and Authentication of Smartphone Users
Submitted by aekwall on Mon, 04/06/2020 - 10:06am
Smartphone Authentication
pattern locks
technological advancements
smartphone users
smartphone embedded sensor data
personal identification numbers
daily physical activity
daily activities
Behavioral biometrics
authentication scheme
Activity Recognition
Scalability
private data
biometrics (access control)
message authentication
machine learning model
smart phones
machine learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
biblio
SigAttack: New High-level SAT-based Attack on Logic Encryptions
Submitted by aekwall on Mon, 04/06/2020 - 10:06am
DIP-generation attack
pattern locks
SigAttack
SAT-resilient encryptions
piracy
logic encryption design
key-revealing signature
high-level SAT-based attack
hardware protection technique
Electronics packaging
distinguishing input pattern generation
Scalability
Error analysis
logic design
Logic gates
Complexity theory
attacks
pubcrawl
Human behavior
Resiliency
Hardware
Cryptography
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »