Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Complexity theory
biblio
Android Malware Risk Evaluation Using Fuzzy Logic
Submitted by grigby1 on Wed, 09/20/2023 - 10:50am
malware
threat assessment
static malware analysis
Resiliency
resilience
pubcrawl
privacy
Metrics
Malware Analysis
Android malware
Industries
Human behavior
grid computing
Fuzzy logic
feature extraction
data analysis
Complexity theory
biblio
Blockchain-based trust evaluation mechanism for Internet of Vehicles
Submitted by grigby1 on Fri, 09/08/2023 - 10:25am
Decision Making
trust computing
malicious attacks
Human Factors
Memory
simulation
Complexity theory
Data Security
smart contracts
security
Internet of Vehicles
internet
Resiliency
resilience
Metrics
Human behavior
pubcrawl
blockchain
biblio
How to Exploit Biham-Keller ID Characteristic to Minimize Data
Submitted by grigby1 on Wed, 08/16/2023 - 3:41pm
Schedules
information security
pubcrawl
resilience
Resiliency
AES
Block Cipher
Cryptography
composability
Complexity theory
IDS
Biham-Keller ID characteristic
impossible differential attack
impossible differential characteristic
SPN cipher
biblio
Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018
Submitted by grigby1 on Wed, 08/16/2023 - 3:40pm
pubcrawl
resilience
Resiliency
telecommunication traffic
composability
Benchmark testing
network security
Complexity theory
documentation
network intrusion detection
IDS
Labeling
datasets
CIC-IDS-2017
CSE-CIC-IDS-2018
network intrusion
biblio
Ibn Omar Hash Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 1:54pm
Hash functions
SHA-512
MD5
Ibn Omar
SHA-256
passwords
Linguistics
hash algorithms
hash
information security
Force
Compositionality
Complexity theory
privacy
Resiliency
resilience
pubcrawl
biblio
A Lightweight Hash-Chain-Based Multi-Node Mutual Authentication Algorithm for IoT Networks
Submitted by grigby1 on Fri, 08/11/2023 - 1:54pm
Internet of Things
security
pubcrawl
resilience
Resiliency
authentication
Complexity theory
Compositionality
Internet of Things (IoT)
Hash functions
hash algorithms
Mission critical systems
Power supplies
hash chain
biblio
A User-Centric Fuzzy AHP-based Method for Medical Devices Security Assessment
Submitted by grigby1 on Fri, 07/28/2023 - 3:34pm
Information Centric Networks
AHP
Biological system modeling
Complexity theory
Ecosystems
Fuzzy logic
internet of medical things
IoMT
medical devices
Metrics
Organizations
pubcrawl
resilience
Resiliency
security
security assessment
biblio
A Bagging MLP-based Autoencoder for Detection of False Data Injection Attack in Smart Grid
Submitted by grigby1 on Fri, 07/21/2023 - 2:42pm
Decision Making
etc
Resiliency
false data injection attacks
False Data Detection
Labeling
resilience
Complexity theory
Smart Grids
security
composability
Smart Grid
Data models
Human behavior
pubcrawl
machine learning
Forestry
biblio
Design of IsoQER Cryptosystem using IPDLP
Submitted by grigby1 on Tue, 07/18/2023 - 3:22pm
Market research
IsoQuadratic Exponentiation Randomized
IsoPartial Discrete Logarithm Problem
Isomathematics
exponentiation
Human Factors
Resiliency
Security analysis
Cyberspace
security
Public key
Complexity theory
Bandwidth
Scalability
Safety
resilience
pubcrawl
biblio
Low-Latency Modular Exponentiation for FPGAs
Submitted by grigby1 on Tue, 07/18/2023 - 3:21pm
computer architecture
pubcrawl
resilience
field programmable gate arrays
Scalability
delays
Complexity theory
Resiliency
Costs
blockchains
Human Factors
exponentiation
Low latency communication
1
2
3
4
5
6
7
8
9
…
next ›
last »