Image

© 2019 Nokomis Incorporated

Home

Products and Technology

About Us

News and Media

Careers

Contact

Products are protected by US Patent Numbers: 10,429,488 | 10,416,286 | 10,416,213 | 10,395,032 | 10,254,326 | 10,235,523 | 10,146,169 | 9,887,721 | 9,851,386 | 9,797,993 | 9,772,363 | 9,658,314 | 9,642,014 | 9,625,509 | 9,599,576 | 9,562,962 | 9,543,105 | 9,382,579 | 9,285,463 | 9,205,270 | 9,059,189 | 8,970,329 | 8,825,823 | 8,643,539 | 8,537,050 | 8,063,813 | 7,515,094

Home

Products and Technology

  • Advanced Detection of Electronic Counterfeits

  •  Hiawatha

About Us

  • Facilities

  • History

  • Contract Vehicles

News and Media

Careers

Contact

 


Archive:


   
 2019-2017     2016-2013     2012-2008   


Weapons Systems and Cyber Security – A Challenging Union

June 2, 2016 - International Conference on Cyber Conflict (CyCon)



Critical Program Information (CPI) Identification and Protection within Research, Development, Test, and Evaluation (RDT&E)

May 28, 2015 - Department of Defense Instruction 5200.39



Fault Attack on AES via Hardware Trojan Insertion by Dynamic Partial Reconfiguration of FPGA Over Ethernet

October 12, 2014 - WESS 2014: Workshop on Embedded Systems Security




Program Protection Planning for Life Cycle Management

October 17, 2013 - Air Force Pamphlet 63-113



Combating Counterfeiting Program

October, 2013 - DLA Logistics Operations



DoD Counterfeit Prevention Policy

April 26, 2013 - Department of Defense Instruction 4140.67



Resilient Military Systems and the Advanced Cyber Threat

January, 2013 - Defense Science Board - Task Force Report


The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies

Bloomberg Businessweek

Counterfeits Costing Semiconductor Industry Billions

EET Asia

Top ten security challenges for connected cars

newelectronics

Challenges in the electronics supply chain

EP&T

PRESS RELEASES

NEWS LINKS

MEDIA

Image
  •  

    Home

    Products and Technology

    About Us

    News and Media

    Careers

    Contact

 

Archive:


   
 2019-2017     2016-2013     2012-2008   

Weapons Systems and Cyber Security – A Challenging Union

June 2, 2016 - International Conference on Cyber Conflict (CyCon)

Critical Program Information (CPI) Identification and Protection within Research, Development, Test, and Evaluation (RDT&E)

May 28, 2015 - Department of Defense Instruction 5200.39


Fault Attack on AES via Hardware Trojan Insertion by Dynamic Partial Reconfiguration of FPGA Over Ethernet

October 12, 2014 - WESS 2014: Workshop on Embedded Systems Security


Program Protection Planning for Life Cycle Management

October 17, 2013 - Air Force Pamphlet 63-113

Combating Counterfeiting Program

October, 2013 - DLA Logistics Operations

DoD Counterfeit Prevention Policy

April 26, 2013 - Department of Defense Instruction 4140.67

Resilient Military Systems and the Advanced Cyber Threat

January, 2013 - Defense Science Board - Task Force Report

PRESS RELEASES

NEWS LINKS

Home

Products and Technology

About Us

News and Media

Careers

Contact

 

Archive:


   
 2019-2017     2016-2013     2012-2008   

Weapons Systems and Cyber Security – A Challenging Union

June 2, 2016 - International Conference on Cyber Conflict (CyCon)

Critical Program Information (CPI) Identification and Protection within Research, Development, Test, and Evaluation (RDT&E)

May 28, 2015 - Department of Defense Instruction 5200.39


Fault Attack on AES via Hardware Trojan Insertion by Dynamic Partial Reconfiguration of FPGA Over Ethernet

October 12, 2014 - WESS 2014: Workshop on Embedded Systems Security


Program Protection Planning for Life Cycle Management

October 17, 2013 - Air Force Pamphlet 63-113

Combating Counterfeiting Program

October, 2013 - DLA Logistics Operations

DoD Counterfeit Prevention Policy

April 26, 2013 - Department of Defense Instruction 4140.67

Resilient Military Systems and the Advanced Cyber Threat

January, 2013 - Defense Science Board - Task Force Report

PRESS RELEASES

NEWS LINKS

Image

 

Archive:


   
 2019-2017     2016-2013     2012-2008   




Weapons Systems and Cyber Security – A Challenging Union

June 2, 2016 - International Conference on Cyber Conflict (CyCon)






Critical Program Information (CPI) Identification and Protection within Research, Development, Test, and Evaluation (RDT&E)

May 28, 2015 - Department of Defense Instruction 5200.39






Fault Attack on AES via Hardware Trojan Insertion by Dynamic Partial Reconfiguration of FPGA Over Ethernet

October 12, 2014 - WESS 2014: Workshop on Embedded Systems Security






Program Protection Planning for Life Cycle Management

October 17, 2013 - Air Force Pamphlet 63-113





Combating Counterfeiting Program

October, 2013 - DLA Logistics Operations





DoD Counterfeit Prevention Policy

April 26, 2013 - Department of Defense Instruction 4140.67





Resilient Military Systems and the Advanced Cyber Threat

January, 2013 - Defense Science Board - Task Force Report



PRESS RELEASES

NEWS LINKS