Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Logic gates
biblio
Reinforcement Learning-assisted Threshold Optimization for Dynamic Honeypot Adaptation to Enhance IoBT Networks Security
Submitted by grigby1 on Thu, 06/09/2022 - 1:31pm
network security
threshold optimization
deception technique
honeypot
Human Factors
data dissemination
iobt
Reinforcement learning
Switches
Logic gates
Scalability
Analytical models
security
Resiliency
resilience
pubcrawl
IoT
Internet of Things
biblio
Suitability of Graph Representation for BGP Anomaly Detection
Submitted by grigby1 on Thu, 06/09/2022 - 1:23pm
Data models
graph
BGP Anomaly
Human Factors
Resiliency
Internet-scale Computing Security
Routing protocols
Compositionality
Metrics
composability
Computational modeling
Logic gates
Scalability
resilience
collaboration
policy-based governance
Human behavior
pubcrawl
machine learning
feature extraction
Training
biblio
High-level Intellectual Property Obfuscation via Decoy Constants
Submitted by grigby1 on Wed, 06/08/2022 - 9:21am
intellectual property security
SAT attack
reverse engineering
Resiliency
resilience
pubcrawl
policy-based governance
Logic gates
IP obfuscation
pattern locks
intellectual property
hardware obfuscation
Hardware
Foundries
digital FIR filter design
composability
Complexity theory
automatic test pattern generation
biblio
GNN4IP: Graph Neural Network for Hardware Intellectual Property Piracy Detection
Submitted by grigby1 on Wed, 06/08/2022 - 9:20am
Logic gates
pubcrawl
policy-based governance
resilience
Resiliency
Hardware
composability
intellectual property
Watermarking
supply chains
intellectual property security
codes
Globalization
biblio
GRU and Multi-autoencoder based Insider Threat Detection for Cyber Security
Submitted by grigby1 on Tue, 06/07/2022 - 10:07am
Filtering
multi-head attention
multi-autoencoder
GRU
data science
Cyberspace
Measurement
Metrics
composability
Logic gates
Correlation
policy-based governance
Human behavior
pubcrawl
Anomaly Detection
Forestry
insider threat
biblio
Review on Network Function Virtualization in Information-Centric Networking
Submitted by grigby1 on Tue, 05/24/2022 - 2:56pm
composability
operating expense
capital expenses
Noise measurement
network function virtualization
Compositionality
Metrics
Information Centric Networks
information-centric networking
Logic gates
Scalability
Hardware
Resiliency
resilience
collaboration
Human behavior
pubcrawl
biblio
Quantifying Geometric Measure of Entanglement of Multi-qubit Graph States on the IBM’s Quantum Computer
Submitted by grigby1 on Fri, 05/20/2022 - 3:32pm
Logic gates
Qubit
pubcrawl
Protocols
composability
Compositionality
Quantum entanglement
Phase measurement
geometric measure of entanglement
Metrology
multi-qubit graph states
quantum computer
quantum state
vertex degree
theoretical cryptography
biblio
Tamper-Resistant Optical Logic Circuits Based on Integrated Nanophotonics
Submitted by aekwall on Thu, 05/19/2022 - 12:41pm
Human Factors
Integrated optics
logic circuits
Logic gates
Metrics
nanophotonics
Optical computing
Optical design
Optical detectors
pubcrawl
Resistance
Scalability
security
Side-channel attack
Tamper resistance
Tamper-Resistance
biblio
Formal Verification Approach to Detect Always-On Denial of Service Trojans in Pipelined Circuits
Submitted by grigby1 on Thu, 05/19/2022 - 12:03pm
Logic gates
pubcrawl
resilience
Resiliency
Integrated circuit modeling
system-on-chip
composability
Benchmark testing
Trojan horses
formal verification
Hardware Trojans
Scalability
denial of service
Microprocessors
Always-On
trojan horse detection
biblio
Hardware Trojan Detection Method for Inspecting Integrated Circuits Based on Machine Learning
Submitted by grigby1 on Thu, 05/19/2022 - 12:02pm
Logic gates
feature extraction
machine learning
pubcrawl
resilience
Resiliency
Hardware
composability
Trojan horses
supply chains
detection model
gate-level
hardware Trojan detection
Integrated circuit interconnections
trigger net
trojan horse detection
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »