150 results on '"Robinson, William A"'
Search Results
2. Understanding time-varying vulnerability accross GPU Program Lifetime
3. Measuring and Mitigating Bias in AI-Chatbots
4. Bio-Inspired, Host-based Firewall
5. Using Deep Learning to Identify Security Risks of Personal Mobile Devices in Enterprise Networks
6. A Black Box Approach to Inferring, Characterizing, and Breaking Native Device Tracking Autonomy
7. Electrical Masking Improvement with Standard Logic Cell Synthesis Using 45 nm Technology Node
8. Gem5Panalyzer: A Light-weight tool for Early-stage Architectural Reliability Evaluation & Prediction
9. Privacy Violating Opensource Intelligence Threat Evaluation Framework: A Security Assessment Framework For Critical Infrastructure Owners
10. Pulse Broadening in Combinational Circuits with Standard Logic Cell Synthesis
11. Effects of Voltage and Temperature Variations on the Electrical Masking Capability of Sub-65 nm Combinational Logic Circuits
12. Network-based detection of mobile malware exhibiting obfuscated or silent network behavior
13. A mobile two-way wireless covert timing channel suitable for peer-to-peer malware
14. The effects of radiation-induced soft errors on hardware implementations of object-tracking algorithms
15. Using network traffic to verify mobile device forensic artifacts
16. Using semi-supervised machine learning to address the Big Data problem in DNS networks
17. Securing commercial WiFi-based UAVs from common security attacks
18. Error Estimation and Error Reduction With Input-Vector Profiling for Timing Speculation in Digital Circuits.
19. Design-based variability in simulating single event transients
20. A Dual-Threshold Voltage Approach for Timing Speculation in CMOS Circuits
21. Developer Behavior and Sentiment from Data Mining Open Source Repositories
22. Using inherent command and control vulnerabilities to halt DDoS attacks
23. Disease diagnostics of biological tissues using free-space technique in terahertz frequency range
24. Remotely inferring device manipulation of industrial control systems via network behavior
25. Racial and gendered experiences that dissuade a career in the professoriate
26. A one Zener diode, one memristor crossbar architecture for a write-time-based PUF
27. Data Mining Behavioral Transitions in Open Source Repositories
28. Fighting banking botnets by exploiting inherent command and control vulnerabilities
29. Identification of Trojans in an FPGA using low-precision equipment
30. Impact of Process Variations on Reliability and Performance of 32-nm 6T SRAM at Near Threshold Voltage
31. Alternative Standard Cell Placement Strategies for Single-Event Multiple-Transient Mitigation
32. A network-based approach to counterfeit detection
33. Analysis of data-leak hardware Trojans in AES cryptographic circuits
34. Racial and gendered experiences that dissuade a career in the professoriate.
35. A one Zener diode, one memristor crossbar architecture for a write-time-based PUF.
36. Timing analysis in software and hardware to implement NIST elliptic curves over prime fields
37. Transition Discovery of Sequential Behaviors in Email Application Usage Using Hidden Markov Models
38. Applying a Rule-Based Natural Language Classifier to Open Source Requirements: a Demonstration of Theory Exploration
39. Detection of Hardware Trojans in Third-Party Intellectual Property Using Untrusted Modules.
40. Addressing Negative Racial and Gendered Experiences That Discourage Academic Careers in Engineering.
41. Using Benchmarks for Radiation Testing of Microprocessors and FPGAs.
42. Stealth assessment of hardware Trojans in a microcontroller
43. Pattern Discovery of User Interface Sequencing by Rehabilitation Clients with Cognitive Impairments
44. Computing Requirements: Cognitive Approaches to Distributed Requirements Engineering
45. Design Comparison to Identify Malicious Hardware in External Intellectual Property
46. Hardware Trojans: The defense and attack of integrated circuits
47. Impact of Synthesis Constraints on Error Propagation Probability of Digital Circuits
48. Impact of ion-induced transients on high-speed dual-complementary Flip-Flop designs
49. Impact of logic synthesis on soft error vulnerability using a 90-nm bulk CMOS digital cell library
50. Fault-tolerant distributed reconnaissance
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.