Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Controllability
biblio
A Stealthy Hardware Trojan Design and Corresponding Detection Method
Submitted by grigby1 on Thu, 05/19/2022 - 12:03pm
Hardware Security
trojan horse detection
imbalanced controllability
Observability
unsupervised clustering
Controllability
transition probability
Systematics
Hardware Trojans
pubcrawl
Trojan horses
Benchmark testing
composability
Integrated circuit modeling
Hardware
Resiliency
resilience
biblio
Degree-sequence Homomorphisms For Homomorphic Encryption Of Information
Submitted by aekwall on Mon, 01/10/2022 - 11:46am
Lattices
Compositionality
Resiliency
topological coding
public-key encryption
Homomorphic encryption
graph homomorphism
asymmetric encryption algorithm
Asymmetric Encryption
Controllability
automation
encoding
Human behavior
Metrics
pubcrawl
Public key
Conferences
biblio
Novel Design of Hardware Trojan: A Generic Approach for Defeating Testability Based Detection
Submitted by aekwall on Mon, 06/28/2021 - 11:41am
Hardware
Support vector machines
Resiliency
pubcrawl
composability
policy-based governance
Trojan horses
timing
Hardware Security
hardware trojan
Controllability
intellectual property
Observability
Stealthy Design.
intellectual property security
biblio
Integrated Reliability Analysis of Control and Information Flow in Energy Internet
Submitted by grigby1 on Wed, 12/02/2020 - 12:53pm
power information
Decision Making
effective path change
electricity business process
energy internet
incidence matrix
information network
integrated reliability analysis
internet
link interruption scenarios
matrix algebra
network topology
power business decision-making
coupling model
power markets
power service controllability
probability
probability index
pubcrawl
Reliability
resilience
Resiliency
Scalability
telecommunication power management
Topology
computer network reliability
Bayesian conditional probability theory
Bayesian network
bi-network interactive model
communication congestion
communication interruption
communication links
Communication networks
communication nodes
communication transmission instructions
communication-communication incidence matrices
communication-control incidence matrices
Bayes methods
connectivity probability calculation method
control instructions
control reliability
control-communication flow
control-communication incidence matrices
Controllability
controllability matrix
controllability metric matrix
controllability probability
Correlation
coupled congestion control
biblio
A Novel PUF based Logic Encryption Technique to Prevent SAT Attacks and Trojan Insertion
Submitted by aekwall on Mon, 11/09/2020 - 12:33pm
intellectual property/IC
IP piracy
SAT attack
hardware obfuscation
Anti-Trojan insertion algorithm
Controllability
copy protection
design-for-trust
hardware Trojan insertion
HT insertion
hardware trojan
logic encryption methods
logic encryption techniques
logic locking
PUF based logic encryption technique
PUF-based encryption
Rare Signal
reverse engineering attack
unique encryption
Hardware Security
encryption
Hardware
invasive software
Resiliency
pubcrawl
composability
policy-based governance
Trojan horses
integrated circuits
Cryptography
Topology
Logic gates
industrial property
reverse engineering
integrated circuit design
logic circuits
Physical Unclonable Function
encryption key
biblio
Method of Ensuring Cyber Resilience of Digital Platforms Based on Catastrophe Theory
Submitted by grigby1 on Tue, 10/06/2020 - 12:40pm
Big Data
Cognitive Computing
Computing Theory
Controllability
cyber resistance
digital economy
digital transformation
Internet of Things IIoT / IoT
models and methods of artificial intelligence
proactive cybersecurity and adaptability
pubcrawl
resilience
Resiliency
robotics
Security Metrics
self-organization
biblio
A Dynamic-Key Secure Scan Structure Against Scan-Based Side Channel and Memory Cold Boot Attacks
Submitted by grigby1 on Fri, 04/05/2019 - 9:29am
memory attack
Side-channel attack
side channel attack
security level
security
secure scan architecture
scan design key generator
Scalability
Resiliency
resilience
Random access memory
pubcrawl
memory cold boot attack
memory attacks
Chained Attacks
integrated circuit testing
Hardware Security
Generators
flip-flops
dynamic-key secure scan structure
dynamic-key secure DFT structure
dynamic key generation
Discrete Fourier transforms
design for testability
design for test technology
Cryptography
Controllability
Clocks
biblio
Secure Scan Architecture Using Clock and Data Recovery Technique
Submitted by grigby1 on Thu, 02/14/2019 - 10:22am
fault coverage
Voltage control
System recovery
security threats
security of data
secure scan architecture
Scan Architecture
Resiliency
resilience
pubcrawl
Observability
Hardware Security
fault diagnosis
authentication
encoding
DLL
DfT technique
DfT
design for testability
delays
Controllability
computer architecture
Clocks
clock-data recovery technique
CDR
biblio
Efficient Control Recovery for Resilient Control Systems
Submitted by grigby1 on Thu, 02/14/2019 - 10:22am
Mathematical model
worst-case execution time
Time complexity
System recovery
Resilient Control Systems
Resiliency
resilience
residual network controllability
residual LTI physical system
recomputation
pubcrawl
network theory (graphs)
minimum input theorem
minimal-input controlled linear-time invariant physical system
maximum matching precomputing
Bipartite graph
LTI model
Linear systems
known system vertex
known network vertex
directed graphs
digraph
cyber-physical systems
controllability recovering
Controllability
Control Theory
control recovery
control engineering computing
computational complexity
biblio
Detection and Masking of Trojan Circuits in Sequential Logic
Submitted by grigby1 on Wed, 04/11/2018 - 2:00pm
Resiliency
Trojan horses
trojan horse detection
Trojan circuit masking
Trojan circuit detection
TC switch description
TC switch
sub-circuit overhead masking
STG description
state variables
state transition graph description
state estimation
sequential circuits
sequential circuit nodes
ROBDDs
binary decision diagrams
resilience
reduced ordered binary decision diagrams
pubcrawl
precise random estimations
Observability
Logic gates
internal node observability
internal node controllability
graph theory
estimation
cyber physical systems
Controllability
composability
Boolean functions
1
2
next ›
last »