Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Complexity theory
biblio
Integration of CPU and GPU to Accelerate RSA Modular Exponentiation Operation
Submitted by grigby1 on Mon, 12/30/2019 - 2:18pm
Mode power operation
tools
stored information
smart phones
security of data
Scalability
RSA modular exponentiation operation
RSA encryption algorithm
RSA
Resiliency
public key cryptography
pubcrawl
personal information
parallel programming
parallel computing
parallel architectures
accelerating RSA algorithm
graphics processing units
graphics process unit
GPU parallel programming
gpu
exponentiation
encryption efficiency
encryption
Data Security
CUDA
CPU
compute unified device architecture
Complexity theory
central process unit
Acceleration
biblio
Take the rein of cyber deterrence
Submitted by aekwall on Wed, 12/18/2019 - 2:36pm
escalation control
uncertainty
surprising effect
security of data
Scalability
resilience
pubcrawl
learning (artificial intelligence)
Law
Human behavior
Complexity theory
employment law
Economics
dynamic retaliation
deterrence strategies
Deterrence
Cyberspace
cyber domain
cyber deterrence
cyber conflicts
biblio
Real-Time Resiliency Assessment of Control Systems in Microgrids Using the Complexity Metric
Submitted by grigby1 on Mon, 12/16/2019 - 3:59pm
power transformers
nonlinear control systems
nonlinear interconnected system
Operational Resilience
operational resilience quantification
power electronic-based components
power electronics
power generation control
power system stability
microsoft windows
Real-time Resiliency
real-time resiliency assessment
resilience
Resiliency
Scalability
solid-state transformer
SST
weather-related disturbances
distributed power generation
Complexity Metric
complexity quantification metric
Complexity theory
control systems
Control Theory
Control Theory and Resiliency
Cyber Physical System
cyber physical systems
pubcrawl
fault tolerance
high speed winds
high-impact low-frequency weather-related events
HILF
Human behavior
Interconnected Systems
Measurement
microgrid
biblio
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security
Submitted by grigby1 on Wed, 12/11/2019 - 12:22pm
Games
universally composable security framework
universal composition operation
universal composability
Task Analysis
secure message communication
pubcrawl
proving simulation-based security
one-time-pad encryption
mechanized UC security analyses
Mechanization
ideally authenticated communication
ideal secure-communication functionality
ideal key-exchange functionality
hard computational problems
protocol verification
game-based security
formal verification
EASYCRYPT proof assistant
EasyCrypt
Diffie-Hellman protocol UC
Diffie-Hellman key-exchange
desired ideal functionality
Decisional Diffie-Hellman problem
Cryptography
Cryptographic Protocols
computer aided cryptography
composability
Complexity theory
complex protocols
biblio
Info-Trust: A Multi-Criteria and Adaptive Trustworthiness Calculation Mechanism for Information Sources
Submitted by aekwall on Mon, 12/09/2019 - 12:23pm
relation-based trust
behavior-based trust
fake information sources
identity-based trust
Info-Trust
Multi-criteria
multicriteria properties
multicriteria trustworthiness calculation mechanism
network information
ordered weighted averaging and weighted moving average combination algorithm
adaptive weight
Sina Weibo
trust calculation technology
trust factors
trust relationships
trustworthiness identification
trustworthy social media system
untrustworthy information sources
Computing Theory and Trust
Decision Making
History
Trusted Computing
Adaptation models
pubcrawl
composability
resource management
Social network services
Computational modeling
social networking (online)
security of data
Data mining
social computing
social media
information sources
Complexity theory
Compositionality
trust calculation mechanism
adaptive trustworthiness calculation mechanism
biblio
Comparative Study of Channel Coding Schemes for 5G
Submitted by aekwall on Mon, 11/25/2019 - 2:06pm
5G
word length 256.0 bit
word length 128.0 bit
turbo codes
Turbo code
successive cancellation list decoding
polar codes
polar code
LDPC
convolutional code
Resiliency
LDPC codes
Complexity theory
5G mobile communication
parity check codes
channel coding
Decoding
Metrics
composability
pubcrawl
biblio
Vulnerability Prediction Based on Weighted Software Network for Secure Software Building
Submitted by grigby1 on Tue, 11/12/2019 - 4:25pm
security
weighted software network
vulnerable software modules
vulnerable classes
vulnerability prediction models
Software systems
software system
software security testing
Software Security Metrics
software metrics
security of data
Complexity theory
secure software building
secure communications software
public security vulnerabilities
pubcrawl
program testing
predictive security metrics
Predictive models
prediction model
Metrics
biblio
The $\beta$-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation
Submitted by grigby1 on Wed, 10/23/2019 - 12:36pm
Risk-Metric
national CERT
original TTC
practical cyber security risk estimation
pubcrawl
resilience
Resiliency
risk management
Risk-Estimation
Metrics
Scalability
security of data
Security Risk Estimation
Security-Metric
Threat Landscape
time-to-compromise metric
vulnerability database
β-distribution
estimation
complex systems
Complexity theory
computer science
continuous attacker skill
CVSS vectors
cyber threat intelligence
Cyber-security
cybersecurity metrics
complex system modeling
Human behavior
Human Factors
individual systems
IT-security
Large-scale systems
mathematical shortcomings
Measurement
methodological shortcomings
biblio
ArtiFact: Architecture and CAD Flow for Efficient Formal Verification of SoC Security Policies
Submitted by aekwall on Tue, 10/22/2019 - 9:54am
security policy implementation
expensive steps
flexible infrastructure IP
functional design flow
illustrative policies
industrial SoC
integrated circuit design
modern SoC design validation
off-the-shelf formal tools
Security Engine
efficient formal verification
simulation-based security verification
SoC Security
SoC security policies
SoC Verification
streamlined verification
system-level security policies
verification time
verification tools
Security Policies Analysis
Engines
Monitoring
IP networks
system-on-chip
pubcrawl
policy-based governance
Cryptography
tools
security architecture
Complexity theory
security of data
security policy
formal verification
alternative architecture
artifact
CAD
CAD flow
centralized infrastructure IP
complex steps
critical steps
biblio
Detection Of Shilling Attack In Collaborative Filtering Recommender System By Pca And Data Complexity
Submitted by grigby1 on Tue, 10/15/2019 - 2:40pm
principal component analysis
unsupervised PCA
unsupervised detection method
suspected attack profiles
shilling attacks detection
Shilling attack detection
security of data
Scalability
Resiliency
resilience
recommender systems
recommender system
pubcrawl
authentic profiles
personalized recommendation
PCA
Human Factors
gaussian distribution
feature extraction
data complexity
Correlation
Complexity theory
collaborative filtering recommender system
collaborative filtering
collaboration
CF recommender system
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »