Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SoC
biblio
Alternatives to Fault Injections for Early Safety/Security Evaluations
Submitted by aekwall on Mon, 03/09/2020 - 11:17am
Human Factors
Security Risk Estimation
system dependability constraints
RTL fault injection campaigns
radiation testing
market pressure
ISO 26262
intertwined hardware
HW-SW systems
functional safety standards
fault injections
dependability analysis
cyber physical systems
hardware-software codesign
Circuit faults
CPS
Safety
safety-critical software
ISO standards
cost reduction
Reliability
Metrics
pubcrawl
Resiliency
Time measurement
system-on-chip
SoC
embedded systems
Software
Hardware
Scalability
security of data
biblio
Architecture Analysis and Verification of I3C Protocol
Submitted by grigby1 on Tue, 11/12/2019 - 4:29pm
SoC
MIPI
Monitoring
Pins
policy-based governance
privacy
protocol verification
Protocols
pubcrawl
IP networks
system Verilog
test environments
Universal Verification Methodology
UVM
verification components
verification environment
VLSI
formal verification
back end design
base class library
Clocks
collaboration
composability
Compositionality
Conferences
digital integrated circuits
Aerospace electronics
front end design
hardware description languages
I3C
I3C bus protocol
improved inter integrated circuit
integrated circuit design
integrated circuit testing
biblio
Optimal Machine Learning Algorithms for Cyber Threat Detection
Submitted by grigby1 on Mon, 06/10/2019 - 1:56pm
Regression
Logistics
machine learning
machine learning algorithms
minimisation
ML-based analytics
Numerical Clustering
optimal machine learning algorithm
prediction
privacy
pubcrawl
learning (artificial intelligence)
resilience
Resiliency
security
security data
security log analytics
security logs
security machine data
security of data
SoC
Decision trees
Anomaly Detection
automated cyber threat detection
classification
Classification algorithms
Clustering algorithms
composability
cyber security
cyber threat detection model
Data mining
data science
advanced targeted cyber threats
deep learning
Dimensionality
efficient machine
Ensemble Learning
exponential hike
false detection rates
false-positive detections
global Security Operations Center environments
Kernel
biblio
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution
Submitted by aekwall on Wed, 02/13/2019 - 11:58am
Runtime
programming
pubcrawl
RA
reduced instruction set computing
remote device integrity
Resiliency
RISC-based embedded devices
RISC-V system-on-chip
Program processors
runtime attestation
security
security of data
security service
SoC
software binaries
system-on-chip
Trusted Computing
embedded Internet of Things devices
composability
control-flow attacks
control-flow attestation schemes
data flow computing
data integrity
data-flow events
data-oriented programming
DOP attacks
attestation
embedded systems
hardware-assisted remote attestation scheme
Human behavior
Internet of Things
lightweight hardware-assisted attestation of program execution
LiteHAX
malicious modification
malware
biblio
Synthesis of Hardware Sandboxes for Trojan Mitigation in Systems on Chip
Submitted by grigby1 on Wed, 05/09/2018 - 2:54pm
security
nontrusted IP
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
property specification language SERE
pubcrawl
run-time verification techniques
sandboxed layouts
sandboxing
IP security
sequential extended regular expressions
SoC
system-on-chip
Trojan horses
Trojan mitigation
trusted system-on-chips
virtualized controllers
virtualized resources
composability
automata theory
automatic generation
behavioral checkers
behavioral properties
CAPSL
collaboration
component authentication process
components off the shelf
automata
computer science
Computers
COTS
design flow
Hardware
hardware sandboxes
interface automata
invasive software
biblio
Programmable Assertion Checkers for Hardware Trojan Detection
Submitted by grigby1 on Wed, 04/11/2018 - 3:01pm
outsourcing
VLSI chips
Trojan horses
trojan horse detection
system-on-chip
system on chip
SoC
security of data
Resiliency
resilience
pubcrawl
programmable logic fabric
programmable logic arrays
programmable assertion checkers
product development
circuit complexity
Monitoring
manufactured product security
manufactured product authenticity
integrated circuit design
hardware Trojan detection
hardware assertion optimization
Hardware
field programmable gate arrays
design complexity
cyber physical systems
cost reduction
composability
Circuit synthesis
circuit designers
biblio
Self-Adaptive FPGA-Based Image Processing Filters Using Approximate Arithmetics
Submitted by grigby1 on Mon, 03/19/2018 - 1:53pm
adaptive filtering
approximate computing
dynamic partial reconfiguration
FPGA
Image Processing
Metrics
pubcrawl
resilience
Resiliency
Scalability
SoC
biblio
An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics
Submitted by grigby1 on Wed, 02/21/2018 - 1:38pm
secure autonomous aerial surveillance
Multicore Computing
multicore computing security
near-sensor data analytics pipeline
Neural networks
parallel architectures
pubcrawl
regular computing task
remote recognition
resilience
Resiliency
Scalability
Metrics
security of data
seizure detection
sensitive data protection
sensors
size 65 nm
SoC
software programmability
system-on-chip
tightly-coupled multicore cluster
voltage 0.8 V
energy 3.16 pJ
CNN
compute-intensive data processing
computer architecture
computerised instrumentation
Cryptography
data analysis
Data Security
deep convolutional neural network
electroencephalogram
encrypted data collection
encryption
approximate computing
energy conservation
Engines
equivalent reduced instruction set computer operation
Face detection
feature extraction
Fulmine tight power envelope
Internet of Things
Internet-of-Things endpoint
IoT endpoint system-on-chip
low-power electronics
biblio
Acquiring Cyber Threat Intelligence through Security Information Correlation
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
reputation damage
highly sophisticated cyber attacks
incident handling
intellectual property theft
Joining processes
knowledge acquisition
malware
Measurement
Metrics
multistage cyber-physical attack campaigns
pubcrawl
health risk
Resiliency
safety risk
security information correlation
security of data
security operation centers
shutdowns
situational awareness
SoC
threat actors
cyber physical systems
APT
attack countermeasures
attack effect mitigation
CAESAIR
composability
computer security
Correlation
CPS
critical infrastructures
advanced persistent threats
cyber situational awareness
cyber threat intelligence acquisition
cyber threat intelligence analysis engine
cyber-physical systems
daily business operations
data analysis
equipment damage
Europe
financial loss
biblio
Fault Injection at Host-compiled Level with Static Fault Set Reduction for SoC Firmware Robustness Testing
Submitted by grigby1 on Wed, 05/17/2017 - 1:48pm
composability
Fault injection
fault set reduction
firmware
host-compiled simulation
Human behavior
pubcrawl
Resiliency
Robustness
SoC
static code analysis
« first
‹ previous
1
2
3
next ›
last »