Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Complexity theory
biblio
A PSNR-Controllable Data Hiding Algorithm Based on LSBs Substitution
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
mobile devices
Steganography
steganalysis
sensors
security
Resistance
Resiliency
pubcrawl170107
PSNR-controllable data hiding algorithm
PSNR
personal privacy
PCDH
Algorithm design and analysis
LSB substitution
information security
Image coding
encoding
decoding algorithms
Decoding
Control Theory
computational complexity
computation complexity
Complexity theory
biblio
Identifying interdependencies using attack graph generation methods
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
risk management
Interdependency
Internet of Things
interoperability
power system faults
Power system protection
pubcrawl170107
pubcrawl170108
risk assessment methods
interdependencies modelling
Safety-Critical Systems
security
Security Metrics
security of data
system complexity
vulnerabilities identification
Wireless communications
distributed schema
attack graphs
Cascading Failures
collaboration
Collaborative Infrastructures
communication assets
complex interconnected networks
Complexity theory
critical infrastructures
attack graph generation methods
e-health
generation complexity
graph theory
heterogeneous collaborative infrastructures
industrial manufacturing automation
information and communication technologies
interdependencies identification
biblio
Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
Cryptographic Protocols
web services
security risks
risk management
resource management
public cloud service providers
public cloud security complexities
pubcrawl170108
pubcrawl170107
Protocols
open systems
open system architecture
multitenancy security issue
multi-tenancy
AAAS protocol
computer architecture
Complexity theory
cloud services
cloud security complexity
cloud infrastructure
cloud computing security risks
Cloud Computing
authorization system
authorization access
authorization
authorisation
authentication-authorization and accounting with secure transport protocol
Access Control
biblio
An autonomic approach to extend the business value of a legacy order fulfillment system
Submitted by grigby1 on Mon, 02/27/2017 - 12:54pm
software applications
Manuals
Monitoring
order fulfillment workflow
pubcrawl170107
retailing industry
self-adaptive systems
self-managing systems
service-oriented architecture
legacy software systems
software engineering
software evolution
software maintenance
Software systems
systems interoperability
systems of systems
third party security screening provider
enterprise resource planning
autonomic behavior
Autonomic computing
autonomic control loop design
autonomic software component
Business
business value
Complexity theory
Databases
autonomic approach
ERP systems
error-prone manual process
human error
human monitoring
hybrid systems
legacy multichannel commerce enterprise resource planning system
legacy order fulfillment system
biblio
Hardware-assisted code obfuscation for FPGA soft microprocessors
Submitted by grigby1 on Mon, 02/27/2017 - 12:53pm
many embedded FPGA system
Table lookup
Switches
software security
software confidentiality
Software
Soft microprocessor
security of data
pubcrawl170107
minimal hardware overhead
microprocessor chips
Code Obfuscation
hardware-software codesign
hardware assisted code obfuscation
Hardware
FPGA soft microprocessors
field programmable gate arrays
encryption
encoding
data dependent control flow modification
Complexity theory
biblio
Algorithmic information theory for obfuscation security
Submitted by grigby1 on Mon, 02/27/2017 - 12:53pm
Code Obfuscation
Complexity theory
encoding
Intellectual Property Protection
Kolmogorov Complexity
Measurement
pubcrawl170107
reverse engineering
security
Software
biblio
"A new mobile payment protocol (GMPCP) by using a new key agreement protocol (GC)"
Submitted by grigby1 on Thu, 02/23/2017 - 12:12pm
mobile computing
wireless network technology
security of data
Repudiation
replay attack
pubcrawl170105
Protocols
privacy protection
privacy
mobile payment protocol
Mobile handsets
mobile devices
client centric model
Mobile communication
key agreement protocol
golden mobile pay center protocol
Golden Circle
GMPCP
GC
financial management
cyber security
Cryptography
Complexity theory
biblio
"Beyond gut instincts: Understanding, rating and comparing self-learning IDSs"
Submitted by abfox on Tue, 02/14/2017 - 1:52pm
Data models
self-learning IDS
security of data
Safety
pubcrawl170101
Organizations
Intrusion Detection Systems
Intrusion Detection
ICT networks
economy vital backbone
advanced persistent threat
Cyber Attacks
customer network data
customer infrastructures
Complexity theory
BAESE system
APT
Analytical models
advanced persistent threats
biblio
"LP formulations for secrecy over erasure networks with feedback"
Submitted by grigby1 on Tue, 02/14/2017 - 12:47pm
arbitrary network
Automatic repeat request
Complexity theory
Cryptography
encryption
erasure network
feedback
Linear programming
LP formulation
message sending
network coding
polynomial time scheme
pubcrawl170102
secure message transmission
telecommunication channels
telecommunication security
biblio
"Enhanced Cryptcoding: Joint Security and Advanced Dual-Step Quasi-Cyclic LDPC Coding"
Submitted by grigby1 on Tue, 02/14/2017 - 12:45pm
frame-error-rate
tablet
smartphone
SLCC
quasicyclic parity check matrix
pubcrawl170102
power-efficient design
Phase change materials
PCM
parity check codes
low density parity check coding
JSALE
JSALC method
joint security and advanced LDPC-based encryption
joint security and advanced dual-step quasicyclic LDPC coding
high throughput mobile device
advanced encryption system
FER
error statistics
encryption
encoding
dual-step secure LDPC code for channel coding
Data Security
cyclic codes
Cryptography
cryptcoding
Complexity theory
Cloud Computing
channel coding
battery-life
AES-128 security level
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
next ›
last »