Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Complexity theory
biblio
Enhanced dynamic cyber zone defense
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
intrusion tolerance
simulation
security of data
security
Runtime
Resiliency
pubcrawl
moving target defense
Limiting
Laboratories
Intrusion Tolrance
intrusion tolerance technique
Algorithm
information security
Heuristic algorithms
dynamic cyber zone defense
discrete-time simulation
cyber systems
cyber incidents
computer security
composability
Complexity theory
collaboration zones
biblio
White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing
Submitted by aekwall on Mon, 07/20/2020 - 10:45am
box times
white box cryptography
white-box Ramsey problem
white-box model
white-box hardness
white-box complexity
the Ramsey problem
TFNP problems
succinct black-box
Ramsey theory
hard property
graph size
graph property testing
description size
collision-resistant hashing
Resiliency
black-box hardness
black-box complexity
search problems
Resistance
Integrated circuit modeling
pubcrawl
Complexity theory
computational complexity
testing
Metrics
Computational modeling
Cryptography
graph theory
composability
biblio
Deletion Propagation for Multiple Key Preserving Conjunctive Queries: Approximations and Complexity
Submitted by grigby1 on Fri, 07/10/2020 - 11:41am
query processing
multiple project-free
multiple queries
nontrivial set
polynomials
privacy
problem funda-mental
pubcrawl
quality management
query feedback
multiple key preserving conjunctive queries
realistic case
repairing data
Scalability
single query case
standard deletion propagation problem
tuples
view propagation
view side-effect
data lineage
Approximation algorithms
approximations
Complexity theory
computational complexity
computer science
conjunctive queries
conjunctive query
data cleaning
data deletion
approximation
Databases
debugging
deletion propagation
dichotomy
dynamic programming
Heuristic algorithms
investigated problem
key preserving
biblio
Reasoning about Sequential Cyberattacks
Submitted by aekwall on Mon, 07/06/2020 - 10:15am
Human Factors
Cyber Dependencies
vulnerability dependencies
simulated vulnerability data
sequential cyberattacks
sequential chained attacks
NP-complete problem
fixed-point operator
cyber-attack modeling
cyber-adversary
cyber adversaries
Cost function
adversarial reasoning
computer systems
Compositionality
Scalability
cognition
Complexity theory
computational complexity
Lattices
Mathematical model
optimisation
Cybersecurity
Metrics
Computational modeling
Social network services
pubcrawl
Resiliency
invasive software
biblio
Investigating Attack Propagation in a SoS via a Service Decomposition
Submitted by grigby1 on Fri, 07/03/2020 - 4:55pm
Safety
systems of systems
system of systems
system decomposition
SoS structure
SoS risk assessment
SoS development life cycle
SoS design
service-guarantees
service levels
service decomposition
Service
sensors
security of data
security
attack propagation
risk management
pubcrawl
Metrics
malicious adversaries
independent systems
decomposition
cyber physical systems
connected systems
Compositionality
Complexity theory
communication as a service
autonomous vehicles
autonomous quarry
attack propagation problem
biblio
HSSM: High Speed Split Multiplier for Elliptic Curve Cryptography in IoT
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
Complexity theory
Cryptography
Elliptic curve cryptography
Elliptic curves
encryption
Metrics
Montgomery Curve
pubcrawl
Random access memory
resilience
Resiliency
Scalability
Scalar Point Multiplication
Twisted Edward Curve
biblio
Cryptanalysis of a One-Time Code-Based Digital Signature Scheme
Submitted by aekwall on Mon, 06/22/2020 - 11:26am
Complexity theory
one-time code-based digital signature scheme
key recovery attack
information set decoding
code-based cryptography
attack complexity
cryptanalysis
Hamming weight
Secret key
Scalability
statistical analysis
public key cryptography
digital signatures
Decoding
Cryptography
pubcrawl
Resiliency
biblio
Code-Based Schemes for Post-Quantum Digital Signatures
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
Complexity theory
quantum security
post-quantum digital signatures
electronic digital signature
code-based schemes
code-based cryptography
CFS scheme
quantum computing
Post-quantum cryptography
Scalability
quantum cryptography
public key cryptography
Public key
digital signatures
Decoding
pubcrawl
Resiliency
digital signature
biblio
ComplexIoT: Behavior-Based Trust For IoT Networks
Submitted by grigby1 on Fri, 06/19/2020 - 11:48am
Policy-Governed Secure Collaboration
Internet of Things
Internet-of-Things
IoT devices
IoT networks
machine learning
network traffic
Object recognition
policy-based governance
generalized decision boundary
pubcrawl
resilience
Resiliency
Scalability
sensors
software defined networking
telecommunication traffic
trust score ranking
behavioral framework
composability
Computer Theory and Trust
Access Control
access control decisions
Anomaly Detection
anomaly detection algorithm
authorisation
behavior-based trust
Compositionality
behavioral model
complex general purpose devices
ComplexIoT
complexity measure
Complexity theory
computer network security
device complexity
false trust
biblio
Quantitative Analysis of Network Address Randomization's Security Effectiveness
Submitted by grigby1 on Fri, 05/15/2020 - 11:57am
quantitative analysis
statistical analysis
static network address
security effectiveness analysis
Scalability
Resiliency
resilience
Reconnaissance
randomization space
randomization frequency
random processes
quantitative security effectiveness analysis
Analytical models
pubcrawl
Network reconnaissance
Network Address Translation
network address randomization techniques
network address randomization
moving target defensee
general attacks
Fingerprint recognition
computer network security
Complexity theory
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »