Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Resistance
biblio
The Design and Implementation of a Multicast Address Moving Target Defensive System for Internet-of-Things Applications
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
multicast communication
working IoT operating system
Synchronization
Simple Agile RPL multiCAST
SARCAST
Routing protocols
Resistance
Resiliency
Reconnaissance
pubcrawl
Protocols
operating systems (computers)
Network reconnaissance
network performance
address agility
multicast address moving target defensive system
IP networks
Internet-of-Things routing protocol
Internet-of-Things applications
Internet of Things
DRM
distributed denial-of-service attacks
DDoS Resistant Multicast
DDoS protection
DDoS Attacks
computer network security
Computer crime
computer architecture
biblio
\#x03BC;Leech: A Side-Channel Evaluation Platform for IoT
Submitted by grigby1 on Tue, 02/06/2018 - 1:59pm
side-channel
Protocols
pubcrawl
Radiation detectors
Resiliency
Resistance
Resistors
security critical applications
security of data
power trace acquisition
side-channel evaluation platform
smart phone
smart phones
square point-of-sale reader
telecommunication security
trusted platform modules
wireless channels
μLeech
IoT
clock manipulation attack
composability
computer network security
cryptographic services
Cryptography
embedded trusted platform module
internet
Internet of Things
Capacitors
IoT device
Low power
microphone-speaker interface
microphones
next generation networks
next generation power scavenging devices
physical security analysis
biblio
Lightweight Obfuscation Techniques for Modeling Attacks Resistant PUFs
Submitted by grigby1 on Tue, 02/06/2018 - 1:55pm
message authentication
Ubiquitous Computing Security
ubiquitous computing
Support vector machines
Scalability
Resistance
Resiliency
resilience
PUF
pubcrawl
physical unclonable functions
physical unclonable function (PUF)
neural nets
Metrics
Arbiter-PUF
machine-learning
machine learning
low-cost pervasive devices
low-cost authentication
Logic gates
lightweight obfuscation
learning (artificial intelligence)
Human Factors
Human behavior
delays
authentication
Artificial Neural Networks
biblio
Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables
Submitted by grigby1 on Tue, 12/12/2017 - 1:19pm
metadata
source code (software)
Servers
security-sensitive metadata
security of data
Scalability
Resistance
Resiliency
pubcrawl
Probes
Metadata Discovery Problem
address space layout randomization
Layout
labor-intensive source code inspection
hidden application-specific primitives
Entropy
crash-resistant primitive automated discovery
crash-resistant code primitives
Computer crashes
Compositionality
binary executables
ASLR
biblio
Residue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
pragmatic hazard
side channel attack
Security analysis
scalar multiplication
RNS
Resistance
Resiliency
residue number systems
residue number system
public key cryptography
pubcrawl
Algorithm design and analysis
power analysis
PA-FA countermeasure
Metrics
Manganese
fault injection attack
fault detection
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
Electronic mail
composability
biblio
Tamper resistance evaluation of PUF in environmental variations
Submitted by grigby1 on Mon, 11/20/2017 - 12:27pm
machine-learning attacks
Tamper resistance
Support vector machines
semiconductor devices
Resistance
Resiliency
resilience
pubcrawl
Predictive models
Physical Unclonable Function
Mathematical model
arbiter PUF
machine learning attacks
Immune system
environmental variation
delays
Data models
counterfeit semiconductor components
counterfeit goods
copy protection
composability
biblio
Security challenges in smart surveillance systems and the solutions based on emerging nano-devices
Submitted by grigby1 on Mon, 11/20/2017 - 12:20pm
neural nets
targeted objects
surveillance
smart surveillance systems
security of data
security
Resistance
Resiliency
pubcrawl
policy-based governance
Policy
Optimization methods
optimisation
aging
nano-devices
memristors
Learning systems
learning (artificial intelligence)
Government
Governance
Detectors
deep neural networks
collaboration
Artificial Neural Networks
artificial neural network
Anomaly Detection
biblio
A PSNR-Controllable Data Hiding Algorithm Based on LSBs Substitution
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
mobile devices
Steganography
steganalysis
sensors
security
Resistance
Resiliency
pubcrawl170107
PSNR-controllable data hiding algorithm
PSNR
personal privacy
PCDH
Algorithm design and analysis
LSB substitution
information security
Image coding
encoding
decoding algorithms
Decoding
Control Theory
computational complexity
computation complexity
Complexity theory
biblio
A precise low-temperature measurement system for conduction cooling Nb3Al superconducting magnet
Submitted by grigby1 on Thu, 02/23/2017 - 2:27pm
plasma toroidal confinement
Weighted Average algorithm
Tokamak devices
Temperature sensors
Temperature measurement
superconducting magnets
Superconducting Magnet
Resistance
pubcrawl170106
process
Precise Temperature Measurement
precise low-temperature measurement system
Platinum resistance thermometer
C8051 Micro Controller Unit
NbTi noninsulation superconducting magnet model
modified weighted average algorithm
location points
fusion reactor instrumentation
Electrical resistance measurement
digital filter program
data acquisition
Current measurement
Cooling
conduction cooling Nb3Al superconducting magnet
C8051 Microcontroller
biblio
Detection, diagnosis, and repair of faults in memristor-based memories
Submitted by BrandonB on Wed, 05/06/2015 - 2:33pm
Memristor
testing
test time
Sneak-paths
sneak-path free crossbar
Resistance
random-access storage
post-silicon recovery
nanoscale fabrication
multiple memory cells testing
memristors
memristor-based memories
memristor failures
Circuit faults
Memory
March testing
maintenance engineering
integrated circuits
hybrid diagnosis scheme
high defect densities
future memory architectures
faulty cell repairs
fault diagnosis
fault detection
crossbar memories
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »