Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Electromagnetic scattering
biblio
Data Injection Attack Against Electronic Devices With Locally Weakened Immunity Using a Hardware Trojan
Submitted by grigby1 on Fri, 09/18/2020 - 2:07pm
security of data
pubcrawl
resilience
Resiliency
Hardware
telecommunication security
integrated circuits
composability
telecommunication channels
Metrics
Electromagnetics
Fault injection
attack targets
communication channel
Communication channels
data injection attack
device availability reduction
device immunity
electrical signal
electromagnetic changes
electromagnetic interference
Electromagnetic scattering
electromagnetic waves
electronic devices
hardware trojan
high-power electromagnetic environments
IEMI
Immunity testing
information and communication devices
integrated circuit reliability
intentional electromagnetic interference
local immunity
locally weakened immunity
low-tolerance IC
low-tolerance integrated circuits
serial communication systems
command injection attacks
biblio
Tamper resistance of IoT devices against electromagnnetic analysis
Submitted by grigby1 on Mon, 11/20/2017 - 12:27pm
Ciphers
composability
Cryptography
electromagnetic analysis
Electromagnetic scattering
electromagnetic waves
field programmable gate arrays
FPGA
Hardware
Hardware Security
Internet of Things
IoT devices
lightweight block cipher
lightweight block ciphers
pubcrawl
resilience
Resiliency
security of IoT device
SIMECK
Tamper resistance
biblio
Simulation of scattering by cylindrical targets hidden behind a layer
Submitted by BrandonB on Tue, 05/05/2015 - 10:23am
analytical-numerical technique
Atmospheric modeling
buried object detection
buried objects
buried targets
cylindrical targets
cylindrical wave approach
Dielectrics
Electromagnetic scattering
electromagnetic wave scattering
fourier analysis
geophysical techniques
hidden objects
hidden scatterers
Image Processing
inversion algorithms
numerical analysis
object retrieval
Reliability
scattering models
Slabs
through-wall imaging applications
through-wall scattering
through-wall sensing