-
1
-
-
34548719905
-
Trojan detection using IC fingerprinting
-
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi and B. Sunar, Trojan detection using IC fingerprinting, Proceedings of the IEEE Symposium on Security and Privacy, pp. 296-310, 2007.
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
3
-
-
80755130139
-
Power fingerprinting in SDR integrity assessment for security and regulatory compliance
-
C. Aguayo Gonzalez and J. Reed, Power fingerprinting in SDR integrity assessment for security and regulatory compliance, Analog Integrated Circuits and Signal Processing, vol. 69(2-3), pp. 307-327, 2011.
-
(2011)
Analog Integrated Circuits and Signal Processing
, vol.69
, Issue.2-3
, pp. 307-327
-
-
Aguayo Gonzalez, C.1
Reed, J.2
-
4
-
-
84929287117
-
Computational Complexity Reduction in PCA-Based Face Recognition
-
Technical Report, Institute of Computer Engineering, Control and Robotics, Wroclaw University of Technology, Wroclaw, Poland
-
W. Baranski, A. Wytyczak-Partyka and T. Walkowiak, Computational Complexity Reduction in PCA-Based Face Recognition, Technical Report, Institute of Computer Engineering, Control and Robotics, Wroclaw University of Technology, Wroclaw, Poland, 2007.
-
(2007)
-
-
Baranski, W.1
Wytyczak-Partyka, A.2
Walkowiak, T.3
-
5
-
-
34247880740
-
Homeland Security Presidential Directive 7
-
The White House, Washington, DC
-
G. Bush, Homeland Security Presidential Directive 7, The White House, Washington, DC, 2003.
-
(2003)
-
-
Bush, G.1
-
7
-
-
84862947659
-
Intrinsic physical-layer authentication of integrated circuits
-
W. Cobb, E. Laspe, R. Baldwin, M. Temple and Y. Kim, Intrinsic physical-layer authentication of integrated circuits, IEEE Transactions on Information Forensics and Security, vol. 7(1), pp. 14-24, 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.1
, pp. 14-24
-
-
Cobb, W.1
Laspe, E.2
Baldwin, R.3
Temple, M.4
Kim, Y.5
-
9
-
-
0028442150
-
Optimal correlation filters for images with signal-dependent noise
-
J. Downie and J. Walkup, Optimal correlation filters for images with signal-dependent noise, Journal of the Optical Society of America A, vol. 11(5), pp. 1599-1609, 1994.
-
(1994)
Journal of the Optical Society of America A
, vol.11
, Issue.5
, pp. 1599-1609
-
-
Downie, J.1
Walkup, J.2
-
10
-
-
0003922190
-
Pattern Classification
-
John Wiley and Sons, New York
-
R. Duda, P. Hart and D. Stork, Pattern Classification, John Wiley and Sons, New York, 2001.
-
(2001)
-
-
Duda, R.1
Hart, P.2
Stork, D.3
-
11
-
-
0035388827
-
Characteristics of radio transmitter fingerprints
-
K. Ellis and N. Serinken, Characteristics of radio transmitter fingerprints, Radio Science, vol. 36(4), pp. 585-597, 2001.
-
(2001)
Radio Science
, vol.36
, Issue.4
, pp. 585-597
-
-
Ellis, K.1
Serinken, N.2
-
12
-
-
85008048480
-
Automatic generation and targeting of application-specific operating systems and embedded systems software
-
L. Gauthier, S. Yoo and A. Jerraya, Automatic generation and targeting of application-specific operating systems and embedded systems software, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 20(11), pp. 1293-1301, 2001.
-
(2001)
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
, vol.20
, Issue.11
, pp. 1293-1301
-
-
Gauthier, L.1
Yoo, S.2
Jerraya, A.3
-
13
-
-
84929281659
-
Chapter 7: Hilbert transforms
-
in The Transforms and Applications Handbook, A. Poularikas (Ed.), CRC Press, Boca Raton, Florida
-
S. Hahn, Chapter 7: Hilbert transforms, in The Transforms and Applications Handbook, A. Poularikas (Ed.), CRC Press, Boca Raton, Florida, 2010.
-
(2010)
-
-
Hahn, S.1
-
15
-
-
0036522441
-
Complexity measures of supervised classification problems
-
T. Ho and M. Basu, Complexity measures of supervised classification problems, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24(3), pp. 289-300, 2002.
-
(2002)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.24
, Issue.3
, pp. 289-300
-
-
Ho, T.1
Basu, M.2
-
16
-
-
0742290133
-
An introduction to biometric recognition
-
A. Jain, A. Ross and S. Prabhakar, An introduction to biometric recognition, IEEE Transactions on Circuits and Systems for Video Technology, vol. 14(1), pp. 4-20, 2004.
-
(2004)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.14
, Issue.1
, pp. 4-20
-
-
Jain, A.1
Ross, A.2
Prabhakar, S.3
-
17
-
-
84929278643
-
Integrated Circuit with Electromagnetic Energy Anomaly Detection and Processing
-
W. Keller and B. Pathak, Integrated Circuit with Electromagnetic Energy Anomaly Detection and Processing, U.S. Patent 20120223403, 2012.
-
(2012)
-
-
Keller, W.1
Pathak, B.2
-
18
-
-
70449496191
-
Sensitivity analysis of burst detection and RF fingerprinting classification performance
-
Proceedings of the IEEE International Conference on Communications
-
R. Klein, M. Temple, M. Mendenhall and D. Reising, Sensitivity analysis of burst detection and RF fingerprinting classification performance, Proceedings of the IEEE International Conference on Communications, 2009.
-
(2009)
-
-
Klein, R.1
Temple, M.2
Mendenhall, M.3
Reising, D.4
-
19
-
-
0004347791
-
Differential Power Analysis
-
Technical Report, Cryptography Research, San Francisco, California
-
P. Kocher, J. Jaffe and B. Jun, Differential Power Analysis, Technical Report, Cryptography Research, San Francisco, California, 1998.
-
(1998)
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
20
-
-
84905122342
-
2013 Threats Predictions
-
Technical Report, Santa Clara, California
-
McAfee Labs, 2013 Threats Predictions, Technical Report, Santa Clara, California, 2012.
-
(2012)
-
-
-
21
-
-
84887499198
-
Executive Order 13636: Improving Critical Infrastructure Cybersecurity
-
The White House, Washington, DC
-
B. Obama, Executive Order 13636: Improving Critical Infrastructure Cybersecurity, The White House, Washington, DC, 2013.
-
(2013)
-
-
Obama, B.1
-
22
-
-
84929286533
-
A Comparison of the Energy Operator and the Hilbert Transform Approach to Signal and Speech Demodulation
-
Technical Report, School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, Georgia
-
A. Potamianos and P. Maragos, A Comparison of the Energy Operator and the Hilbert Transform Approach to Signal and Speech Demodulation, Technical Report, School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, Georgia, 1995.
-
(1995)
-
-
Potamianos, A.1
Maragos, P.2
-
23
-
-
0004082156
-
Digital Communications
-
McGraw-Hill, New York
-
J. Proakis, Digital Communications, McGraw-Hill, New York, 2000.
-
(2000)
-
-
Proakis, J.1
-
24
-
-
77950633052
-
Improved wireless security for GMSK-based devices using RF fingerprinting
-
D. Reising, M. Temple and M. Mendenhall, Improved wireless security for GMSK-based devices using RF fingerprinting, International Journal of Electronic Security and Digital Forensics, vol. 3(1), pp. 41-59, 2010.
-
(2010)
International Journal of Electronic Security and Digital Forensics
, vol.3
, Issue.1
, pp. 41-59
-
-
Reising, D.1
Temple, M.2
Mendenhall, M.3
-
25
-
-
84864245597
-
A hybrid framework of intrusion detection system for resource consumption based attacks in wireless ad hoc networks
-
K. Selvamani, S. Anbuchelian, S. Kanimozhi, R. Elakkiya, S. Bose and A. Kannan, A hybrid framework of intrusion detection system for resource consumption based attacks in wireless ad hoc networks, Proceedings of the International Conference on Systems and Informatics, pp. 8-12, 2012.
-
(2012)
Proceedings of the International Conference on Systems and Informatics
, pp. 8-12
-
-
Selvamani, K.1
Anbuchelian, S.2
Kanimozhi, S.3
Elakkiya, R.4
Bose, S.5
Kannan, A.6
-
26
-
-
84863213589
-
RF-based anomaly detection for PLCs in critical infrastructure applications
-
S. Stone and M. Temple, RF-based anomaly detection for PLCs in critical infrastructure applications, International Journal of Critical Infrastructure Protection, vol. 5(2), pp. 66-73, 2012.
-
(2012)
International Journal of Critical Infrastructure Protection
, vol.5
, Issue.2
, pp. 66-73
-
-
Stone, S.1
Temple, M.2
-
27
-
-
84929284578
-
RF-based PLC IC design verification
-
presented at the Diminishing Manufacturing Sources and Material Shortages and Standardization Conference
-
S. Stone, M. Temple and R. Baldwin, RF-based PLC IC design verification, presented at the Diminishing Manufacturing Sources and Material Shortages and Standardization Conference, 2012.
-
(2012)
-
-
Stone, S.1
Temple, M.2
Baldwin, R.3
-
28
-
-
84876380168
-
W32.Duqu: The Precursor to the Next Stuxnet
-
version 1.4, Technical Report, Mountain View, California
-
Symantec, W32.Duqu: The Precursor to the Next Stuxnet, version 1.4, Technical Report, Mountain View, California, 2011.
-
(2011)
-
-
-
29
-
-
0030206510
-
Instruction level power analysis and optimization of software
-
V. Tiwari, S. Malik, A. Wolfe and M. Lee, Instruction level power analysis and optimization of software, Journal of VLSI Signal Processing, vol. 13(2-3), pp. 223-238, 1996.
-
(1996)
Journal of VLSI Signal Processing
, vol.13
, Issue.2-3
, pp. 223-238
-
-
Tiwari, V.1
Malik, S.2
Wolfe, A.3
Lee, M.4
-
30
-
-
34547417210
-
USA PATRIOT Act of 2001
-
Public Law 107-56, Washington, DC
-
U.S. Congress, USA PATRIOT Act of 2001, Public Law 107-56, Washington, DC, 2001.
-
(2001)
-
-
Congress, U.S.1
-
31
-
-
84929279437
-
Memorandum for LDRD Proposal Review Committee
-
Air Force Civil Engineer Center, Joint Base San Antonio - Lackland, San Antonio, Texas
-
T. Watley, Memorandum for LDRD Proposal Review Committee, Air Force Civil Engineer Center, Joint Base San Antonio - Lackland, San Antonio, Texas, 2012.
-
(2012)
-
-
Watley, T.1
-
32
-
-
78650413543
-
RF-DNA fingerprinting for airport WiMax communications security
-
M. Williams, S. Munns, M. Temple and M. Mendenhall, RF-DNA fingerprinting for airport WiMax communications security, Proceedings of the Fourth International Conference on Network and System Security, pp. 32-39, 2010.
-
(2010)
Proceedings of the Fourth International Conference on Network and System Security
, pp. 32-39
-
-
Williams, M.1
Munns, S.2
Temple, M.3
Mendenhall, M.4
-
33
-
-
85164891605
-
Augmenting bit-level network security using physical layer RF-DNA fingerprinting
-
Proceedings of the IEEE Global Telecommunications Conference
-
M. Williams, M. Temple and D. Reising, Augmenting bit-level network security using physical layer RF-DNA fingerprinting, Proceedings of the IEEE Global Telecommunications Conference, 2010.
-
(2010)
-
-
Williams, M.1
Temple, M.2
Reising, D.3
-
34
-
-
84861095752
-
How digital detectives deciphered Stuxnet
-
the most menacing malware in history, Wired, July 11
-
K. Zetter, How digital detectives deciphered Stuxnet, the most menacing malware in history, Wired, July 11, 2011.
-
(2011)
-
-
Zetter, K.1
-
35
-
-
0019009078
-
OSI reference model - The ISO model of architecture for open systems interconnection
-
H. Zimmermann, OSI reference model - The ISO model of architecture for open systems interconnection, IEEE Transactions on Communications, vol. 28(4), pp. 425-432, 1980.
-
(1980)
IEEE Transactions on Communications
, vol.28
, Issue.4
, pp. 425-432
-
-
Zimmermann, H.1
|