Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
Best of Both Worlds: Integration of Split Manufacturing and Camouflaging into a Security-Driven CAD Flow for 3D ICs
Submitted by grigby1 on Thu, 07/30/2020 - 2:06pm
pubcrawl
Layout
layout camouflaging
LC
malicious entities
manufacturing
manufacturing flow
manufacturing paradigm
Metrics
production engineering computing
ip protection
resilience
reverse engineering
security
security-driven CAD flow
SM
split manufacturing
supply chains
Three-dimensional displays
extensive security analysis
policy-based governance
composability
IP piracy
3D ICs
business models
CAD
Cryptography
DRC-clean layouts
Resiliency
Foundries
Human behavior
Human Factors
industrial property
integrated circuit design
integrated circuit manufacture
integrated circuits
IP networks
biblio
Reusable intellectual property core protection for both buyer and seller
Submitted by grigby1 on Thu, 07/30/2020 - 2:05pm
intellectual property
seller watermark
scheduling phase
reusable intellectual property core protection
register allocation phase
latency overhead
IP seller
IP core protection
IP core design
design cost overhead
Consumer electronics
CE devices
buyer fingerprint
architectural synthesis process
ip protection
Watermarking
logic circuits
resource management
Metrics
Fingerprint recognition
Registers
composability
embedded systems
microprocessor chips
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
IP networks
logic design
biblio
A New Pay-Per-Use Scheme for the Protection of FPGA IP
Submitted by grigby1 on Thu, 07/30/2020 - 1:53pm
complex FPGA designs
ip protection
reusable intellectual property design blocks
Physical Unclonable Function
pay-per-use
IP instance
IP infringement
FSM
FPGA IP vendor
FPGA IP protection
finite state machine
Field-Programmable Gate Arrays
Design methodology
copy protection
logic design
application specific integrated circuits
finite state machines
Licenses
composability
PUF
industrial property
field programmable gate arrays
Resiliency
resilience
policy-based governance
pubcrawl
IP networks
security
biblio
A hardware intellectual property protection scheme based digital compression coding technology
Submitted by grigby1 on Thu, 07/30/2020 - 1:50pm
Resiliency
intellectual property
intellectual property security
IP core watermark
IP networks
ip protection
policy-based governance
pubcrawl
resilience
industrial property
resource utilization
Robustness
security
surrounding circuit
Table lookup
watermark information
Watermarking
composability
image watermarking
hardware intellectual property protection
hardware circuit
Hardware
FPGA circuit
FPGA
field programmable gate arrays
encoding
embedding cost
Digital Watermark
digital compression coding technology
decoding function
data compression
Cryptography
Compression coding
biblio
Development of a Mathematical Model of Threat to Information Security of Automated Process Control Systems
Submitted by grigby1 on Fri, 07/24/2020 - 12:59pm
game theory
Control Theory
Shtakelberg game
security threats model formation
intruder
information security threats
Deming-Shewhart cycle
continuous Deming-Shewhart cycle
automated process control systems
attack
abstract mathematical model
threat model
Access Control
control engineering computing
process control
information security
Games
pubcrawl
Mathematical model
IP networks
security of data
security
production engineering computing
biblio
A Protocol Independent Approach in Network Covert Channel Detection
Submitted by grigby1 on Thu, 07/16/2020 - 12:18pm
supervised learning
network traffic dataset
protocol independent approach
protocol-independent approach
Protocols
pubcrawl
resilience
Resiliency
Scalability
stealth tunnels
network storage covert channel detection
supervised machine learning technique
support vector machine (SVM)
Support vector machines
TCP
TCP protocols
telecommunication computing
telecommunication traffic
wireless channels
IP networks
Compositionality
covert channel communication
covert channels
Decision Tree
DNS
DNS protocols
feature extraction
generic detection model
composability
IP protocols
IPv4
k-nearest neighbors
Kernel
logistic regression
Logistics
machine learning
network covert channel
biblio
Detecting cryptocurrency miners with NetFlow/IPFIX network measurements
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
Internet activity
unknown mining servers
telecommunication traffic
telecommunication computing
Resiliency
resilience
pubcrawl
NetFlow network measurements
NetFlow measurements
mine cryptocurrencies
Metrics
machine learning
learning (artificial intelligence)
IPFIX network measurements
IP networks
computer network security
internet
Human Factors
Human behavior
DNS traffic
Distributed databases
deep packet inspection
Data mining
Cryptojacking detection
cryptojacking
cryptocurrency mining
cryptocurrency miner detection
cryptocurrencies
cost-efficiency miner detection
biblio
Resident Evil: Understanding Residential IP Proxy as a Dark Service
Submitted by grigby1 on Fri, 07/10/2020 - 11:55am
residential-ip
malware hosting
Malware-and-unwanted-software
Network-and-systems-security
proxy hosts
pubcrawl
resident evil
residential IP proxy
residential networks
residential proxy
Logic gates
residential-IP-proxy-as-a-service
residential-proxy
RESIP IP
Security-and-privacy-for-the-Internet-of-Things
server- side
Servers
underground business world
web-proxy
emerging Internet business
Companies
compromised hosts
Computer crime
computer network security
dark service
dark web
elusive gray services
Embedded-systems-security
anonymity
engineered RESIP services
Human behavior
Human Factors
illicit operations RESIP hosts
internet
Internet service
invasive software
IP networks
biblio
Multipath Traffic Engineering for Software Defined Networking
Submitted by grigby1 on Fri, 07/03/2020 - 1:27pm
IP networks
telecommunication traffic
Streaming media
software defined networking
service quality criteria
Scalability
Resiliency
resilience
quality of service
pubcrawl
Protocols
packet communication
network bandwidths
multipath traffic engineering
multimedia market
IPS
application-aware mechanism
Internet video sharing
internet
Inspection
IDS
Firewalls (computing)
firewall
dpi
deep packet inspection
control systems
communication bottlenecks
Broadcasting
broadcast television
bandwidth restrictions
ASA systems
biblio
Markov Augmented Neural Networks for Streaming Video Classification
Submitted by grigby1 on Fri, 07/03/2020 - 1:27pm
Markov processes
video streaming services
video streaming
video signal processing
telecommunication traffic
streaming video classification
Scalability
Resiliency
resilience
pubcrawl
port scanning
Neural networks
neural nets
content providers
Markov Decision Process
Markov augmented neural networks
machine learning
IP networks
IP addresses
internet providers
internet
Inspection
image classification
deep packet inspection techniques
deep packet inspection
decision theory
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »