Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

security verification

biblio

Visible to the public Security Verification of Artificial Neural Networks Used to Error Correction in Quantum Cryptography

Submitted by grigby1 on Fri, 05/08/2020 - 3:01pm
  • partially synchronized neural networks
  • telecommunication security
  • Synchronization
  • synchronisation
  • security verification
  • Resiliency
  • resilience
  • quantum cryptography
  • pubcrawl
  • policy-based governance
  • passive attacks
  • Artificial Neural Networks
  • Neurons
  • Neural Network Security
  • neural nets
  • Metrics
  • machine learning
  • error rates
  • error correction codes
  • error correction
  • collaboration
biblio

Visible to the public Property Specific Information Flow Analysis for Hardware Security Verification

Submitted by grigby1 on Mon, 05/20/2019 - 4:30pm
  • Scalability
  • Metrics
  • policy-based governance
  • potential security violations
  • property specific information flow analysis
  • property specific search
  • property specific trimming technique
  • pubcrawl
  • resilience
  • Resiliency
  • Mathematical model
  • security
  • security critical paths
  • security model
  • security of data
  • security property
  • security verification
  • timing
  • Trojan horses
  • unintended design flaws
  • hardware security verification
  • collaboration
  • Complexity theory
  • composability
  • Control Theory
  • Design methodology
  • formal verification
  • Hardware
  • hardware information flow analysis
  • Hardware Security
  • Acceleration
  • hardware security vulnerabilities
  • Hardware Trojans
  • Human behavior
  • Human Factors
  • information flow analysis
  • information flow models
  • information flow security
  • information theoretic security

Terms of Use  |  ©2023. CPS-VO