Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pipeline processing
biblio
Nested Pipeline Hardware Self-Organizing Map for High Dimensional Vectors
Submitted by aekwall on Mon, 03/22/2021 - 12:10pm
neural net architecture
fully parallel computation
high dimensional vectors
homogeneous modular structure
low-dimensional vectors
multiple clocks
nested architecture
nested pipeline hardware self-organizing map
neural chips
frequency 60.0 MHz
operable clock frequency
original nested SOM
pipeline computation
Self-Organizing Map
sequential computation
single vector
VHDL
weight vector update
Pipelines
FPGA
Hardware
computer architecture
Resiliency
pubcrawl
Neurons
clustering
Vectors
field programmable gate arrays
expandability
Compositionality
Clocks
pipeline processing
MNIST
self-organising feature maps
Self-organizing feature maps
biblio
High-Performance and Range-Supported Packet Classification Algorithm for Network Security Systems in SDN
Submitted by grigby1 on Tue, 02/23/2021 - 1:38pm
packet header bits
512-bit OpenFlow rule
Bit Vector-based packet classification methods
content-addressable storage
high clock frequency
key function
multidimensional fields
multifield matching
network security systems
Clocks
packet switching
range fields
range matching
Range Supported Bit Vector algorithm
Range-Supported packet classification algorithm
RSBV
rule sets
two-dimensional modular architecture
Communication networks
IP networks
pubcrawl
Metrics
resilience
Resiliency
computer network security
Throughput
internet
security
composability
telecommunication network routing
encoding
pattern classification
SDN
software defined networking
pipeline processing
network coding
biblio
Design and Implementation of DNA Based Cryptographic Algorithm
Submitted by aekwall on Mon, 02/08/2021 - 12:50pm
S-box
pipeline processing
half cryptographic framework
DNA based S-box
DNA based cryptographic algorithm
current security
Circuits and systems
Artix-7 device
AES-Algorithm
biocomputing
DNA cryptography
security
cryptographic algorithm
Predictive Metrics
DNA
privacy
standards
pubcrawl
Human behavior
Resiliency
encryption
Cryptography
biblio
Design and Analysis of SIC: A Provably Timing-Predictable Pipelined Processor Core
Submitted by grigby1 on Mon, 10/05/2020 - 1:00pm
SIC
worst-case execution time
WCET analysis
WCET
timing-predictable pipelined processor core
timing predictability
timing compositionality
timing anomalies
timing
Task Analysis
strictly in-order core
standard in-order pipeline design
Silicon carbide
Compositionality
real-time systems
pubcrawl
pipelining
Pipelines
pipeline processing
multiprocessing systems
multicore timing analysis
Multicore processing
multi-core
monotonicity
microprocessor chips
Hardware
biblio
Parallelization of Brute-Force Attack on MD5 Hash Algorithm on FPGA
Submitted by grigby1 on Fri, 09/04/2020 - 2:37pm
32/34/26-instance parallelization
brute force attacks
single Virtex-7 FPGA device
pre-image brute-force attack
pipeline processing
MD5 hash generation
MD5 hash algorithm
LUT
IP core
HDL
Hardware design languages
guess password generation
Cryptography
field programmable gate arrays
gpu
policy-based governance
Human Factors
password
pubcrawl
Generators
Hardware
computer architecture
Hardware Implementation
biblio
Cyberthreat Detection from Twitter using Deep Neural Networks
Submitted by grigby1 on Fri, 05/08/2020 - 1:43pm
security alert
Neural Network Security
Neural networks
open source intelligence platforms
OSINT
pipeline processing
policy-based governance
pubcrawl
public domain software
recurrent neural nets
Resiliency
named entity recognition task
security information
security of data
security-related information
social media networks
social networking (online)
Task Analysis
threat detection
tools
Twitter
cyberthreat detection
bidirectional long short-term memory network
classification task
collaboration
computer security
convolutional neural nets
convolutional neural network
cyber physical systems
cybersecurity information
cybersecurity-related sources
Artificial Neural Networks
cyberthreat intelligence
deep learning
deep neural networks
event management systems
indicators of compromise
information streams
IT infrastructure
learning (artificial intelligence)
Metrics