Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Logic gates
biblio
A Credential Store for Multi-tenant Science Gateways
Submitted by BrandonB on Wed, 05/06/2015 - 2:11pm
middleware tier
user interfacing tier
user interfaces
Servers
security
Science Gateways
resource tier
Portals
overlay cyber infrastructure
OA4MP
multitenant science gateways
Apache Airavata
middleware
Logic gates
grid computing
gateway middleware
credential store
computational grids
Communities
clouds
Cloud Computing
authentication
biblio
A support middleware solution for e-healthcare system security
Submitted by BrandonB on Wed, 05/06/2015 - 2:10pm
Logic gates
wireless sensor networks
system security
support middleware solution
security vulnerabilities
security of data
patient information security
patient information privacy
network security
middleware
Medical services
medical administrative data processing
masquerade attack
authentication
Internet security
information sharing
health care-specific security standards
health care organizations
health care
electronic health care
e-Healthcare
e-health care system security
Data Security
data privacy
data integrity
Communication system security
biblio
Fabrication Attacks: Zero-Overhead Malicious Modifications Enabling Modern Microprocessor Privilege Escalation
Submitted by BrandonB on Wed, 05/06/2015 - 2:06pm
invasive software
computer architecture
cyber-attacks
embedded microprocessors
embedded systems
fabrication
fabrication attacks
Hardware
Hardware Trojans
high-performance microprocessors
zero-overhead malicious modifications
Logic gates
malicious modification
Microprocessors
modern microprocessor privilege escalation
multiprocessing systems
privilege escalation
Trojan horses
zero overhead
biblio
TorWard: Discovery of malicious traffic over Tor
Submitted by BrandonB on Wed, 05/06/2015 - 1:56pm
malicious traffic discovery
Tor exit routers
Tor
telecommunication traffic
telecommunication network routing
spam
Servers
Ports (Computers)
Peer-to-peer computing
P2P traffic
Mobile handsets
malware
Bandwidth
malicious traffic categorization
Malicious Traffic
low-latency anonymous communication system
Logic gates
intrusion detection system
IDS alerts
IDS
DoS
denial-of-service attack traffic
Computers
computer network security
biblio
Reverse Engineering Digital Circuits Using Structural and Functional Analyses
Submitted by BrandonB on Wed, 05/06/2015 - 11:42am
reverse engineering
integrated circuit design
integrated circuits
intellectual property
invasive software
IP theft
IP violation detection
Logic gates
register files
Inference algorithms
SoC design
structural analysis
subtractors
system-on-chip
test circuits
Trojan horses
unstructured netlist
very large highly-optimized system-on-chip design
functional analysis
Algorithm design and analysis
algorithmic reverse engineering digital circuits
combinational elements
computer security
counters
design automation
Digital circuits
formal verification
adders
Globalization
globalized multivendor environment
Hardware
hardware trojans-malware
high-level netlist
ICs
industrial property
biblio
Slack removal for enhanced reliability and trust
Submitted by BrandonB on Wed, 05/06/2015 - 11:34am
Small Delay Defects
mission-critical application
pattern count
reliability enhancement
security of data
security vulnerabilities
security-critical application
slack removal
Slacks
malicious circuitries
test quality
testing
timing slacks
transition fault patterns
Trojan horses
trust enhancement
Wires
fabrication
care bit density intact
Circuit faults
delay defect detection
delay defects
delay unit insertion
delays
design for testability
design technique
At-speed Testing
Hardware
hardware trojan
Hardware Trojans
integrated circuit reliability
logic circuits
Logic gates
logic testing
biblio
Hardware trojan detection by symmetry breaking in path delays
Submitted by BrandonB on Wed, 05/06/2015 - 11:33am
inter-and intra-die variations
Trojan horses
Transistors
symmetry breaking
symmetric paths
subcircuit consistencies
side channel methods
Sensitivity
path delays
path delay
Logic gates
invasive software
benchmark circuits
integrated circuits
IC
HT
hardware Trojan detection
hardware trojan
Hardware
electronic engineering computing
detect modifications
delays
circuit symmetries
biblio
Detection of hardware Trojan in SEA using path delay
Submitted by BrandonB on Wed, 05/06/2015 - 11:33am
HTH detection and insertion
Trojan horses
Trojan circuits
SEA crypto
scalable encryption algorithm crypto
Scalable Encryption Algorithm (SEA)
payload Trojan detection rate
payload Trojan
path delay
Logic gates
logic circuits
layout level Trojan insertions
IP blocks
invasive software
Algorithm design and analysis
hardware Trojan horses insertion
Hardware Trojan horses (HTH)
hardware Trojan detection
Hardware
GDSII hard macros
GDSII
gate level Trojan insertions
fabless design house
encryption
delays
Cryptography
ASIC design flow
application specific integrated circuits
biblio
A new type of intrusion prevention system
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
active defense intrusion detection system
Communication networks
Computer hacking
computer network security
defense
Interaction honeypot
Intrusion Detection
intrusion prevention system
Logic gates
mixed interactive honeypot
Monitoring
network security
operating systems
Servers
biblio
A real continuously moving target simulation system design without time delay error
Submitted by BrandonB on Tue, 05/05/2015 - 11:23am
Logic gates
time delay error adjustment
time delay error
signal processing technique
radar antennas
Radar cross-sections
radar moving target simulator
radar signal processing
radar simulator
Laser radar
phase compensation
moving target simulator
continuously moving target simulation system design
Delay effects
Delay lines
digital delay technique
discrete time delay
echo
delays
echo time delay
« first
‹ previous
…
20
21
22
23
24
25
26
27
28
next ›
last »