Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

ubiquitous computing devices

biblio

Visible to the public Machine Learning Based IoT Edge Node Security Attack and Countermeasures

Submitted by grigby1 on Fri, 09/04/2020 - 3:38pm
  • noninvasive architecture independent machine learning attack
  • cloned PUF devices
  • Cloning
  • cloning accuracy
  • highly connected ecosystem
  • IoT edge node security attack
  • machine-learning based countermeasure
  • malicious attack
  • malicious PUF modeling
  • authentic PUFs
  • physically unclonable functions
  • PUF
  • PUF architecture
  • PUF designs
  • PUF structure
  • two-stage brute force attack model
  • ubiquitous computing devices
  • brute force attacks
  • machine learning
  • Internet of Things
  • security
  • Cloud Computing
  • Servers
  • computer network security
  • Protocols
  • authentication
  • computer architecture
  • Cryptography
  • cloud server
  • pubcrawl
  • IoT networks
  • IoT
  • IoT devices
  • learning (artificial intelligence)
  • Human Factors
  • policy-based governance

Terms of Use  |  ©2023. CPS-VO