Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Complexity theory
biblio
An Intelligent Mechanism for Sybil Attacks Detection in VANETs
Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
telecommunication computing
user privacy information
SyDVELM mechanism
Sybil Attacks.
fixed road-side components
Extreme Machine Learning
extreme learning machine
Acceleration
Scalability
distributed network
telecommunication network topology
Complexity theory
feedforward neural nets
VANET
data privacy
machine learning
sybil attacks
Metrics
vehicular ad hoc networks
VANETs
Sybil attack detection
privacy
composability
pubcrawl
Resiliency
security
data integrity
telecommunication security
biblio
Exploring Metadata Search Essentials for Scientific Data Management
Submitted by grigby1 on Fri, 12/11/2020 - 2:59pm
Metadata Indexing
tree data structures
search problems
scientific file formats
scientific data management
Scalability
Resiliency
resilience
real-world astronomy observation dataset
query processing
pubcrawl
Metadata Search
metadata queries
metadata indexing methodologies
astronomy computing
Metadata Discovery Problem
metadata characteristics
metadata attributes
metadata
meta data
indexing data structure
indexing
HDF5
data structures
data structure
data management
Compositionality
Complexity theory
biblio
Mixed-Trust Computing for Real-Time Systems
Submitted by grigby1 on Wed, 12/02/2020 - 2:14pm
Runtime
VM hosting
virtual machines
untrusted components
trusted hypervisor
Trusted Computing
trust
traditional verification methods
timing guarantees
timing
Task Analysis
scheduling
safety-critical software
safety-critical autonomous features
Safety
complex cyber-physical systems
real-time systems
real-time mixed-trust computing framework
Raspberry Pi 3 implementation
pubcrawl
program verification
Human Factors
Human behavior
framework design
drone application
CPS critical functions
Computing Theory
Computational modeling
Complexity theory
biblio
A Two-Stage Genetic Programming Hyper-Heuristic for Uncertain Capacitated Arc Routing Problem
Submitted by grigby1 on Tue, 12/01/2020 - 2:01pm
poor routing policies
vehicle routing
UCARP
Two-Stage GPHH
two-stage genetic programming hyper-heuristic
TS-GPHH
Task Analysis
Statistics
Sociology
single-objective GPHH
search problems
routing policy
Routing
Robustness
pubcrawl
complex uncertain capacitated arc routing problem
optimization
MultiObjective GP
multi-objective.
MOGP
interpretable routing policies
human trust
Human behavior
graph theory
GPHH
GP-evolved routing policies
genetic algorithms
effective routing policies
Complexity theory
biblio
Mystic: Mystifying IP Cores Using an Always-ON FSM Obfuscation Method
Submitted by aekwall on Mon, 11/09/2020 - 1:32pm
integrated circuit industry
IP piracy
application specific integrated circuits
ASIC technology
circuit complexity
combinational circuits
finite state machine
FSM obfuscation method
hardware obfuscation method
Hardware Security
IP overproduction
ITC99 circuit benchmarks
logic encryption
Logic masking
Mystic obfuscation approach
Mystic protection method
mystifying IP cores
Logic gates
Hardware
Resiliency
pubcrawl
composability
policy-based governance
Production
Complexity theory
microprocessor chips
IP networks
obfuscation
reverse engineering
encoding
finite state machines
logic circuits
logic design
size 45.0 nm
biblio
A Comparison of Nano-Patterns vs. Software Metrics in Vulnerability Prediction
Submitted by grigby1 on Wed, 11/04/2020 - 1:36pm
program testing
web services
vulnerable methods
vulnerable code
vulnerability prediction models
Vulnerability
vulnerabilities
software security
software quality
software metrics
Software
security of data
security
pubcrawl
Complexity theory
Predictive models
Object oriented modeling
nanopatterns
nano-pattern
metrics testing
Metrics
method-level traceable patterns
method-level software metrics
Measurement
learning (artificial intelligence)
Java
internet
biblio
Measuring Impact Score on Confidentiality, Integrity, and Availability Using Code Metrics
Submitted by grigby1 on Wed, 11/04/2020 - 1:35pm
object-oriented methods
vulnerable source code
source code (software)
software vulnerabilities
software security
software quality metrics
software quality
software metrics
Software
security of data
Security Metrics
security
secure software
pubcrawl
PHP security
object-oriented PHP application
Availability Score
Object oriented modeling
national vulnerability database
metrics testing
Metrics
Measurement
Integrity Score
CVSS
Couplings
Correlation
Confidentiality Score
Complexity theory
code metrics
Code Characteristics
CIA Model
biblio
Property Based Formal Security Verification for Hardware Trojan Detection
Submitted by grigby1 on Mon, 11/02/2020 - 1:35pm
Resiliency
invasive software
Logic gates
malicious Hardware Trojans
modern computer hardware
policy-based governance
pubcrawl
register transfer level information flow security models
resilience
intellectual property security
secret information
security
security behavior
Security Properties
Semantics
Theorem Proving
third-party intellectual property cores
Trojan horses
golden reference design
composability
Coq
fine grained gate level information flow model
formal representations
formal security verification
Formal Specification
formal verification
formal verification method
Complexity theory
Hardware
hardware designs
Hardware Security
hardware trojan
industrial property
information flow analysis
Integrated circuit modeling
biblio
A Graph Theory Approach towards IJTAG Security via Controlled Scan Chain Isolation
Submitted by grigby1 on Mon, 11/02/2020 - 12:28pm
Registers
IJTAG network
IJTAG security
Instruments
intellectual property security
isolation signals
microprocessor chips
on-chip access
on-chip instruments
policy-based governance
power consumption
pubcrawl
IJTAG
resilience
Resiliency
scan chain
security
security of data
system-on-chip
system-on-chip designs
third party intellectual property providers
unauthorized user access
untrusted sources
Diagnosis
Clocks
Complexity theory
composability
controlled scan chain isolation
data integrity
Data Integrity Attacks
data manipulation
data protection scheme
data sniffing
debug
design for test
authorisation
electronic design automation
embedded instruments
embedded systems
graph coloring problem
graph colouring
graph theory approach
hidden test-data registers
IEEE standards
IEEE Std 1687
IEEE Std. 1687
biblio
Enhancing Smart Grid Cyber-Security Using A Fuzzy Adaptive Autonomy Expert System
Submitted by aekwall on Mon, 10/12/2020 - 11:36am
power system security
Human automation interaction
Human behavior
human computer interaction
information technology
leave-one-out cross-validation
level of automation
performance shaping factors
power engineering computing
gradient methods
pubcrawl
Resiliency
Scalability
security of data
smart grid cybersecurity
Smart Grids
smart power grids
expert systems
Adaptive Autonomy
adaptive systems
automation
Complexity theory
Computer crime
cyber security
environmental conditions
expert system database
False Data Detection
Expert Systems and Security
fuzzy adaptive autonomy expert system
fuzzy expert system
fuzzy rule
fuzzy set theory
fuzzy systems
gradient descent algorithm
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »