Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
arrays
biblio
Spectre Attacks: Exploiting Speculative Execution
Submitted by aekwall on Mon, 10/14/2019 - 9:20am
Program processors
Transient analysis
speculative-execution
Spectre
side-channel attacks
Scalability
return oriented programming
Resiliency
Registers
pubcrawl
rop attacks
microarchitecture-security
microarchitecture
microarchitectural-attack
Human Factors
Human behavior
Hardware
composability
arrays
biblio
A Lightweight Malware Classification Method Based on Detection Results of Anti-Virus Software
Submitted by grigby1 on Wed, 06/20/2018 - 11:57am
Malware Analysis
static analysis
Resiliency
resilience
pubcrawl
program diagnostics
privacy
Phased arrays
pattern classification
Metrics
Malware Clustering
malware classification
antivirus software detection
malware
lightweight malware classification
internet
Human behavior
Electronic mail
dynamic analysis
Databases
Data mining
cyber threats
computer viruses
arrays
biblio
Scalable stochastic-computing accelerator for convolutional neural networks
Submitted by grigby1 on Thu, 06/07/2018 - 2:06pm
pubcrawl
Weight parameter retraining
system-on-chip
Stochastic computing
scalable stochastic-computing accelerator
SC-based neural networks
Resiliency
resilience
Recognition accuracy
arrays
Neural Network Resilience
neural nets
convolutional neural networks
convolutional neural network
convolution
ConvNets
computational complexity
Biological neural networks
biblio
A data remanence based approach to generate 100% stable keys from an SRAM physical unclonable function
Submitted by grigby1 on Wed, 05/16/2018 - 12:49pm
random noise
word length 256 bit
TMV scheme
Thermal stability
temporal majority voting
stable keys
stable key generation
SRAM chips
SRAM cells
SRAM cell
SRAM based key generation
SRAM
Resiliency
resilience
remanence
reliable key generation
arrays
pubcrawl
power ramp up times
Physical Unclonable Function
memory size 512 KByte
inherent process mismatch
Hardware
encryption keys
device aging
data remanence based approach
data remanence
Cryptography
Compositionality
Circuit stability
bit masking
biblio
Hierarchical Graph Neuron Scheme in Classifying Intrusion Attack
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
Metrics
Training data
Training
testing
Resiliency
resilience
pubcrawl
Pattern recognition
Neurons
arrays
Intrusion Detection
information security
Indexes
Hierarchical Graph Neuron
composability
classification
attack graphs
biblio
Correlation Analysis among Java Nano-Patterns and Software Vulnerabilities
Submitted by grigby1 on Mon, 03/05/2018 - 12:08pm
pubcrawl
testing
static analysis
Software patterns
Software
security vulnerabilities
security
Resiliency
resilience
arrays
nano-patterns
Metrics
Measurement
Java
Cryptography
Compositionality
Complexity theory
coding theory
biblio
Research of a reconfigurable coarse-grained cryptographic processing unit based on different operation similar structure
Submitted by grigby1 on Wed, 02/21/2018 - 12:45pm
pubcrawl
logic synthesis
M/DLFSR
Metrics
multiply/divide linear feedback shift register
Policy
Policy-Governed Secure Collaboration
power aware computing
power consumption saving
logic design
Reconfigurable
reconfigurable architectures
reconfigurable coarse-grained cryptographic processing unit
resilience
Resiliency
Scalability
shift registers
size 55.0 nm
Different Operations Similar Structure
Algorithm design and analysis
arrays
Ciphers
coarse-grained reconfigurable cryptologic array
collaboration
composability
Cryptography
cryptology
55nm CMOS standard-cell library
different operations similar structure reconfigurable design
feedback
feedback shift register structure
finite Field GF(2n)
Galois fields
Human behavior
human factor
Linear feedback shift registers
biblio
Text Mining in Unclean, Noisy or Scrambled Datasets for Digital Forensics Analytics
Submitted by grigby1 on Tue, 02/06/2018 - 12:34pm
LERP-RSA
Text Mining
text analytics
Social network services
Scalability
pubcrawl
pattern detection
Noise measurement
Metrics
ARPaD
Human Factors
Human behavior
email analysis
Electronic mail
Digital Forensics
composability
arrays
biblio
Correctness of the routing algorithm for distributed key-value store based on order preserving linear hashing and skip graph
Submitted by grigby1 on Wed, 01/10/2018 - 11:27am
overlay networks
uniform routing table
telecommunication network routing
skip graph
routing algorithm
Routing
Resiliency
query forwarding
pubcrawl
Peer-to-peer computing
Partitioning algorithms
arrays
overlay network
order preserving linear hashing
linear hashing
Limiting
hop reduction
hash algorithms
graph theory
distributed key-value store
Distributed databases
Compositionality
biblio
Predicting buffer overflow using semi-supervised learning
Submitted by grigby1 on Mon, 11/27/2017 - 11:30am
Human Factors
vulnerability detection
taxonomy
software security
Semisupervised learning
semi-supervised learning
security of data
Resiliency
pubcrawl
pattern classification
Metrics
machine learning
learning (artificial intelligence)
Indexes
22-dimension vector extraction
Human behavior
Compositionality
Complexity theory
Clustering algorithms
classifier training
C/C++ source files
Buffer storage
Buffer overflows
buffer overflow vulnerability prediction
buffer overflow
AST
arrays
Antlr
« first
‹ previous
1
2
3
4
next ›
last »