Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Logic gates
biblio
An Effective DDoS Defense Scheme for SDN
Submitted by grigby1 on Mon, 11/19/2018 - 11:24am
prediction value
Taylor series
Switches
software defined networking
software defined networkcontroller
security gateway
SDN controller
Scalability
Resiliency
resilience
pubcrawl
Computer crime
openflow switch
Logic gates
IP networks
internetworking
Human Factors
honey pots
Entropy
distributed denial-of-service attacks
DDoS Attacks
computer network security
biblio
Phonon confinement effects in diffusive quantum transport simulations with the effective mass approximation and k·p method
Submitted by grigby1 on Thu, 08/23/2018 - 10:59am
Logic gates
Transistors
Strain
Silicon
semiconductor device models
Resiliency
resilience
pubcrawl
privacy
phonons
phonon confinement effects
p-type silicon nanowire transistors
nanowires
n-type silicon nanowire transistors
advanced modeling tools
k·p method
elemental semiconductors
electron-phonon coupling
Electric potential
effective mass approximation
effective mass
dissipative quantum transport calculations
diffusive quantum transport simulations
cyber-physical systems
confinement
composability
Charge carrier processes
biblio
Control systems and the internet of things \#x2014; Shrinking the factory
Submitted by grigby1 on Wed, 07/18/2018 - 9:15am
pubcrawl
Logic gates
Monitoring
network capable computer
passive infrared detectors
powerful ARM processor
Production facilities
programmable I-O interface
programming interfaces
Lips
Radio network
Raspberry Pi
Scalability
sensor network
sensors
smart interconnected society
user interfaces
wireless LAN
feedback mechanisms
component
control loop
control systems
control-monitoring systems
domestic Internet solution
factory automation
factory control systems
Factory System
battery life
I-O Systems
i-o systems security
industrial control
infrared detectors
Interfaces
internet
Internet of Things
IoT
biblio
A subthreshold 30pJ/bit self-timed ring based true random number generator for internet of everything
Submitted by grigby1 on Mon, 06/11/2018 - 2:48pm
resilience
Noise
oscillator
Oscillators
physics based entropy source
pubcrawl
PVT variation
random number generation
random number generator
NIST SP 800-22 statistical tests
Resiliency
Ring oscillators
security
size 180.0 nm
statistical testing
subthreshold self-timed ring
true random number generator (TRNG)
Internet of Everything
CMOS flash process
composability
Cryptography
Entropy
FIPS 140-2
Generators
high quality random bit sequences
integrated circuit design
CMOS analogue integrated circuits
Internet of Things
inverter based ring oscillator
Jitter
Logic gates
Metrics
Microelectronics Security
NIST
biblio
Secured Dual-Rail-Precharge Mux-based (DPMUX) symmetric-logic for low voltage applications
Submitted by grigby1 on Mon, 06/11/2018 - 2:48pm
processed data
Metrics
Microelectronics Security
PAA
power analysis attacks
power consumption
Power dissipation
private key cryptography
probability
Probability distribution
low-power electronics
pubcrawl
resilience
Resiliency
secret cryptographic keys
secured dual-rail-precharge mux
side channel attack
Signal to noise ratio
Switches
DPMUX symmetric-logic
average power dissipation
clock cycle
combinatorial logic
composability
cryptographic algorithms
Cryptography
delays
deterministic power
Digital circuits
activity factor
dynamic switching energy
Hardware implementations
Information Leakage
linear relationship
logic circuits
logic design
Logic gates
low voltage applications
biblio
An assessment of vulnerability of hardware neural networks to dynamic voltage and temperature variations
Submitted by grigby1 on Thu, 06/07/2018 - 2:06pm
natural language processing
timing
temperature variations
Speech recognition
Resiliency
resilience
pubcrawl
problem solving
Neural Network Resilience
neural network algorithms
neural nets
adders
multilayer perceptrons
MLP
medical applications
Logic gates
learning (artificial intelligence)
hardware neural networks
Hardware
dynamic voltage
CNN
Biological neural networks
biblio
Design of an Authentication and Key Management System for a Smart Meter Gateway in AMI
Submitted by grigby1 on Wed, 05/30/2018 - 3:09pm
privacy
two-phase authentication mechanism
SMGW
smart meters
smart meter gateway
smart meter
smart grid consumer privacy
Smart Grid
smart appliance control
security concerns
pubcrawl
Protocols
privacy concerns
AMI
power usage statistics
Logic gates
key management scheme
internetworking
Human Factors
home automation systems
home automation
Home appliances
encryption
domestic appliances
DLMS/COSEM
authentication
biblio
Design of Boolean Chaotic Oscillator Using CMOS Technology for True Random Number Generation
Submitted by grigby1 on Thu, 05/24/2018 - 11:16am
random number generation
message authentication
Metrics
National Institute of Standards and Technology
NI ELVIS platform
Oscillators
pubcrawl
random cryptographic keys
random key generation
Logic gates
random number generators
random numbers
resilience
Resiliency
Ring oscillators
Scalability
security keys
45nm CMOS technology
Inverters
Human behavior
Generators
delays
data transmission security
Cryptography
CMOS integrated circuits
CMOS Boolean Chaotic Oscillator Design
CMOS
chaos
Capacitors
Cadence Virtuoso tool
cadence virtuoso
authentication security
application specific integrated circuits
biblio
Hardware Trojan Detection Based on Correlated Path Delays in Defiance of Variations with Spatial Correlations
Submitted by grigby1 on Wed, 04/11/2018 - 2:01pm
intradie variation
Trojan horses
trojan horse detection
spatial correlations
Solid modeling
side channel analysis
Resiliency
resilience
pubcrawl
Process Variations
path delay ratio
path delay
minimally invasive Trojans
malicious circuit
Logic gates
invasive software
composability
interdie variation
Integrated circuit modeling
Integrated circuit interconnections
Image edge detection
HT inserted circuits
HT detection methods
HT detection method
hardware Trojan detection
Hardware Security
delays
cyber physical systems
Cryptography
Correlation
correlated path delays
biblio
Trojan-Feature Extraction at Gate-Level Netlists and Its Application to Hardware-Trojan Detection Using Random Forest Classifier
Submitted by grigby1 on Wed, 04/11/2018 - 2:00pm
Logic gates
TrustHUB benchmarks
Trojan-feature extraction
Trojan nets
Trojan horses
trojan horse detection
Resiliency
resilience
random forest classifier
Random Forest
pubcrawl
normal nets
Multiplexing
malicious third-party vendors
machine-learning based hardware Trojan classifier
machine learning
Benchmark testing
learning (artificial intelligence)
invasive software
integrated circuits
integrated circuit design
IC design process
hardware-Trojan infected nets
hardware-Trojan detection
hardware trojan
Hardware
gate-level netlists
gate-level netlist
feature extraction
F-measure
cyber physical systems
composability
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
…
next ›
last »