Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
FPGA
biblio
An Improved Cross-Coupled NAND Gates PUF for Bank IC Card
Submitted by grigby1 on Wed, 09/11/2019 - 1:45pm
composability
FPGA
Metrics
Microelectronics Security
physical unclonable functions
pubcrawl
resilience
Resiliency
system-on-chip
biblio
FPGA-oriented moving target defense against security threats from malicious FPGA tools
Submitted by aekwall on Mon, 09/09/2019 - 9:48am
FOMTD
Predictive Metrics
Xilinx
target defense
reverse engineering
moving target defense principle
malicious FPGA tools
hardware trojan
FPGA-oriented MTD method
FPGA users
FPGA security
FPGA hardware-software providers
FPGA emulation results
FPGA design suite
FPGA configuration
security of data
defense lines
moving target defense
Benchmark testing
Scalability
Hardware Security
security threats
Trojan horses
pubcrawl
Resiliency
Table lookup
security
Hardware
FPGA
field programmable gate arrays
biblio
Zynq FPGA Based System Design for Video Surveillance with Sobel Edge Detection
Submitted by aekwall on Mon, 08/12/2019 - 8:46am
Surveillance systems and ARM processor
learning (artificial intelligence)
live traffic analysis
Metrics
pubcrawl
Reconfigurability
Resiliency
Scalability
security
Sobel edge detection
Streaming media
surveillance
input composite video surveillance
Thermal Imaging
VGA
video coding
video interface
video streaming
video surveillance
Xilinx ZC702 platfor
ZC702
Zynq FPGA based system design
Zynq-7000
field programmable gate arrays
analog composite video interface
analog CVBS
camera
Cameras
computer architecture
computer vision
Decoding
deep learning
deep video
edge detection
edge detection filter
ADAS
FPGA
Hardware
HDMI-MIPI CSI
high speed serial interfaces
image classification
Image edge detection
image filtering
Image resolution
industrial automation
input composite video decoding
biblio
An Efficient FPGA Implementation of ECC Modular Inversion over F256
Submitted by aekwall on Wed, 05/01/2019 - 11:36am
modular inversion
Extended Euclidean Algorithm
Elliptic curve cryptography
Metrics
pubcrawl
Resiliency
Scalability
FPGA
biblio
Hardware Implementation of Multi-Scroll Chaos Based Architecture for Securing Biometric Templates
Submitted by grigby1 on Fri, 03/22/2019 - 11:35am
hardware resources
Xilinx FPGA
Xilinx
Security analysis
security
Scalability
Resiliency
resilience
real-time systems
pubcrawl
multiscroll chaos based architecture
multi-scroll
Metrics
Mathematical model
low cost image encryption
Image Processing
biometric encryption
Hardware
FPGA
field programmable gate arrays
Euler method
embedded systems
embedded biometric systems
Cryptography
computer architecture
chaotic N × N grid multiscroll system
chaotic communication
chaos-based multiscroll encryption algorithm
chaos
biometrics-based personal authentication systems
biometrics (access control)
biometric templates
biblio
Enabling Hardware Trojan Detection and Prevention through Emulation
Submitted by grigby1 on Fri, 03/15/2019 - 10:59am
Logic gates
Trojan horses
trojan horse detection
Trojan attack signatures
trojan
tools
Supply Chain
pubcrawl
programmable hardware
Payloads
emulation
invasive software
in-service systems
in-design systems
HWA
hardware Trojan detection
Hardware Assurance
Hardware
FPGA
field programmable gate arrays
biblio
Embedded policing and policy enforcement approach for future secure IoT technologies
Submitted by aekwall on Mon, 03/11/2019 - 9:37am
Root-of-trust
MPSoC
platform module
policy violation
potential technical vulnerabilities
pro-active policy
pubcrawl
Quality Control
Resiliency
malicious application
secure IoT technologies
software security technologies
SPE approach
supply chain efficiencies
system communication bus
system resources
Trusted Platfrom Modules
Zero-day attacks
computer network security
ARM TrustZone
Attack vectors
authentication mechanisms
authorisation
business operations
chain-of-trust
commercial building management
composability
additional threats
embedded applications
embedded hardware
embedded systems
end users
FPGA
hardware security policy engine
Internet of Things
IoT applications
biblio
Low False Alarm Ratio DDoS Detection for ms-scale Threat Mitigation
Submitted by aekwall on Wed, 02/13/2019 - 10:56am
network security
intrusion detection and prevention
intrusion detection system
low false alarm ratio DDoS detection
low reaction time detection system
massive IoT botnets
metric
mitigation system
Monitoring
ms-scale threat mitigation
Inspection
next-generation security solutions
pubcrawl
reaction times
Resiliency
threat mitigation
threat type
volatile DDoS threats
volatile ephemeral DDoS attacks
false alarm rate
attackers
automated response
botnet
Computer crime
computer network security
data center networks
DDoS
Detectors
advanced security solutions
false detection
field programmable gate arrays
FPGA
high-intensity short-duration volatile ephemeral attack waves
Human behavior
human out-of-loop
human-in-the-loop security center paradigm
IDS
biblio
Programmable SoC platform for deep packet inspection using enhanced Boyer-Moore algorithm
Submitted by grigby1 on Wed, 09/12/2018 - 10:25am
SIMD
Program processors
Programmable SoC
pubcrawl
real-time on-line pattern search
real-time systems
resilience
Resiliency
Scalability
search problems
platform based design methodologies
string matching
system monitoring
system-on-chip
SystemC
TCP
TCP packets
Xilinx Zynq programmable SoC
Zynq
High-Le'vel Synthesis
Algorithm design and analysis
BM string search algorithm
Boyer-Moore
Boyer-Moore algorithm
computer network security
deep packet inspection
FPGA
Hardware
high level synthesis
Accelerator
high-level synthesis
Inspection
MISD parallelism
Network Monitoring
network security
parallel processing
Payloads
Platform Based Design
biblio
An FPGA Coarse Grained Intermediate Fabric for Regular Expression Search
Submitted by grigby1 on Wed, 09/12/2018 - 10:24am
deep packet inspection
FPGA
IDS
overlay
pubcrawl
regular expression
resilience
Resiliency
Scalability
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »