Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Logic gates
biblio
Automated white-list learning technique for detection of malicious attack on web application
Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
Logic gates
XSS attack
XML
Web Application Security
WAMG(Web Application Model Generator)
Structured Query Language
Standards organizations
SQL injection attack
semistructured XML case generation
security of data
security
Resiliency
pubcrawl
Organizations
malicious attack detection
maintenance engineering
automated white-list learning technique
learning (artificial intelligence)
internet
Human behavior
HTTP response splitting attack
HTTP request splitting attack
Generators
extensible markup language
Default Deny model(White Listing)
Default allow model (Black Listing)
default allow model
cross site scripting attack
Cross Site Scripting
composability
Buffer overflow attack
biblio
Coexistence of cellular IOT and 4G networks
Submitted by grigby1 on Thu, 04/20/2017 - 12:34pm
Internet of Things
Resiliency
pubcrawl
NB-IOT
Metrics
machine-to-machine communications
M2M applications
M2M
LTE
Long Term Evolution
Logic gates
Load management
3GPP
Human behavior
coupled CIOT-LTE architecture
computer architecture
collaboration
clean slate CIOT network
clean slate
cellular radio
cellular IoT network
Cellular IOT (CIOT)
4G network
4G mobile communication
biblio
Privacy-preserving functional IP verification utilizing fully homomorphic encryption
Submitted by grigby1 on Wed, 03/08/2017 - 2:33pm
IP theft
system-on-chip
SoC design
sequential benchmark circuits
security parameter sizes
pubcrawl170112
privacy-preserving version
privacy-preserving functional IP verification
Noise
magnitude IP verification
Logic gates
Libraries
IP users
Cryptography
IP reuse
IP networks
IP core
intellectual property verification
industrial property
IC industry
IC design business model
globalized supply chain
functional verification
fully homomorphic encryption
encryption
data privacy
biblio
Efficient and secure split manufacturing via obfuscated built-in self-authentication
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
Layout
untrusted foundries
trustworthiness
supply chains
split manufacturing
semiconductor supply chain
reverse engineering
pubcrawl170112
OBISA circuit
obfuscated built-in self-authentication
Logic gates
chip layout
IP piracy
invasive software
integrated circuits
integrated circuit reliability
integrated circuit manufacture
hardware Trojan insertion
Foundries
fabrication
delays
biblio
Trends on EDA for low power
Submitted by grigby1 on Wed, 03/08/2017 - 1:54pm
state-of-the-art microprocessors
low-power electronics
microprocessor chips
optimization
Physical design
power consumption
Power demand
power optimization
pubcrawl170110
Low power
transistor circuits
transistor layout
transistor network
transistor sizing
Transistors
visualization
visualization tools
AD 2012
Logic gates
Libraries
layout design automation tool
Layout
ISPD Contest
integrated circuit layout
electronic design automation
EDA algorithms
EDA
discrete gate sizing
continuous gate sizing
cell library
Algorithms
Algorithm design and analysis
AD 2013
biblio
Neighborhood area network security in smart grid using security enhanced key updating
Submitted by grigby1 on Tue, 03/07/2017 - 1:33pm
simple one-way hash function based scheme
PCL
power system security
process analysis toolkit
protocol composition logic
Protocols
pubcrawl170109
SAE protocols
security attacks
security enhanced key updating
PAT
simultaneous authentication of equals protocols
Smart Grid
smart grid infrastructure
Smart Grids
smart power grids
telecommunication security
wireless mesh networks
WMNs
EMSA protocol
Communication networks
Computer crime
Cryptographic Protocols
cyber-attacks
denial of service attack
DoS attack
efficient mesh security association protocols
EMSA
authentication
EMSA protocols
IEEE 802.11s
key refreshment strategy
Logic gates
mesh key holder security handshake
MKHSH
NAN
neighborhood area network security
biblio
SiGe Clock and Data Recovery System Based on Injection-Locked Oscillator for 100 Gbit/s Serial Data Link
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
serial data link
microwave oscillators
millimeter-wave data communication
Oscillators
phase comparator
Phase locked loops
phase noise
phase tracking
phase-locked loop (PLL)
power 1.4 W
Logic gates
SiGe
size 130 nm
Synchronization
time 1.2 ps
voltage 2.3 V
Voltage control
windowed phase comparator
zero bit patterns
comparators (circuits)
BiCMOS integrated circuits
BiCMOS SiGe
bit rate 100 Gbit/s
bit rate 50 Gbit/s
CDR system
clock and data recovery (CDR)
clock and data recovery circuits
clock and data recovery system
Clocks
100 Gbps
Detectors
frequency 100 GHz
frequency 25 GHz
frequency tracking
Ge-Si alloys
injection locked oscillators
injection-locked oscillator
injection-locked oscillator (ILO)
biblio
An efficient diagnosis method to deal with multiple fault-pairs simultaneously using a single circuit model
Submitted by BrandonB on Wed, 05/06/2015 - 2:32pm
Integrated circuit modeling
stuck-at faults
single circuit model
nonequivalent-fault pairs
Multiplexing
multi-pair diagnosis
Logic gates
IWLS'05 benchmark circuit
ISCAS'89 benchmark circuit
automatic test pattern generation
fault pairs diagnosis
Fault injection
fault diagnosis
diagnosis-aware ATPG method
diagnosis pattern generation
Circuit faults
Central Processing Unit
biblio
Robust, Secure, and Cost-Effective Design for Cyber-Physical Systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:16pm
middleware
stability
smart power grids
Smart Grid
security vulnerability
Robustness
quality of service
power system security
Phasor measurement units
Monitoring
cost-effective architecture
Logic gates
Intelligent systems
cyberphysical systems
cyber-physical-social systems
cyber-physical systems
CPSS
CPS
cost-effective design
biblio
Towards efficient group management and communication for large-scale mobile applications
Submitted by BrandonB on Wed, 05/06/2015 - 2:14pm
Manganese
vehicles
surveillance
Subscriptions
reliable communication
real-time tracking
Real-time monitoring
public security
node mutual awareness
mobile workforce management
mobile systems
mobile nodes
mobile networks
mobile computing
middleware
collaboration
Logistics
Logic gates
large-scale mobile applications
group management
Group communication
geopositioning
fleet tracking and management system
Emergency Response
distributed middleware
DDS
context-specific group communication
context-defined groups
context-defined group management
« first
‹ previous
…
20
21
22
23
24
25
26
27
28
next ›
last »