Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Algorithm
biblio
Fast Decryption Algorithm for Paillier Homomorphic Cryptosystem
Submitted by aekwall on Mon, 02/01/2021 - 10:35am
Homomorphic encryption
storage paradigm
Scalability
Resiliency
public-key cryptosystem
pubcrawl
Paillier homomorphic encryption scheme
Paillier homomorphic cryptosystem
paillier cryptosystem
modular multiplicative arithmetic
Metrics
improved decryption process
Human Factors
Algorithm
fast decryption process
fast decryption algorithm
encryption
encrypted data
decryption speed
decryption
data privacy
Cryptography
Computational efficiency
computational cost
Complexity theory
Cathode ray tubes
biblio
Application of Differential Privacy in Location Trajectory Big Data
Submitted by grigby1 on Mon, 12/28/2020 - 11:38am
differential privacy protection technology
social software
resilience
position trajectory
mobile Internet technology
mobile computing
Metrics
location trajectory privacy protection
location trajectory Big Data
location trajectory
location based services
internet
GPS technology
Global Positioning System
differential privacy
differential privacy protection
Data protection
data privacy
Big Data privacy protection
big data privacy
Big Data
Algorithm
Human behavior
Resiliency
Scalability
composability
pubcrawl
biblio
Enhanced dynamic cyber zone defense
Submitted by aekwall on Mon, 07/27/2020 - 11:12am
intrusion tolerance
simulation
security of data
security
Runtime
Resiliency
pubcrawl
moving target defense
Limiting
Laboratories
Intrusion Tolrance
intrusion tolerance technique
Algorithm
information security
Heuristic algorithms
dynamic cyber zone defense
discrete-time simulation
cyber systems
cyber incidents
computer security
composability
Complexity theory
collaboration zones
biblio
Image Encryption and Decryption using Enigma Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 11:44am
highly advanced technologies
secured procedure
secured image processing
Rotors
Resiliency
resilience
red intensity
pubcrawl
pixel
original RGB value
military communication
Mathematical model
image security
image encryptions
image encryption
image colour analysis
Algorithm
green intensity
enigma machine
enigma algorithm
enigma
encryption
encrypting decrypting images
efficient encryption
decryption
cyber-physical systems
Cryptography
computationally efficient procedure
composability
Breadboard
blue intensity
biblio
Agile Release Planning Using Natural Language Processing Algorithm
Submitted by aekwall on Mon, 05/18/2020 - 9:54am
agile release planning
word corpus
user story
team working
software prototyping
similar user stories
RV coefficient NLP algorithm
Release Planning
Rally
R Programming
provided user stories
project release
natural language processing algorithm
JIRA
Java utility
complex software engineering projects
Scalability
agile methodology
project management
Algorithm
Currencies
Software algorithms
Java
software development management
software engineering
natural language processing
Planning
pubcrawl
Human behavior
Resiliency
Software
biblio
Research on LED lightweight cryptographic algorithm based on RFID tag of Internet of things
Submitted by aekwall on Mon, 03/23/2020 - 12:33pm
LED lightweight cryptographic algorithm
search problems
RFIDs
RFID tags
RFID tag chip
RFID tag
Resiliency
radiofrequency identification
radio frequency identification tags
pubcrawl
Piccolo cryptographic algorithm
light emitting diodes
LED lightweight cryptography
Algorithm
InvS-box
Internet of Things
Human behavior
FPGA
field programmable gate arrays
DPA protection technology threshold
DPA attack
Differential Power Analysis
Cryptography
Ciphers
Boolean functions
Boolean expression reconstruction
biblio
Modification and Optimization of Solovey-Strassen's Fast Exponentiation Probablistic Test Binary Algorithm
Submitted by aekwall on Mon, 01/20/2020 - 10:48am
optimization
test
Solovey-Strassen fast exponentiation probablistic test binary algorithm
Solovey-Strassen
Software algorithms
Scalability
Resiliency
pubcrawl
probability test
probability
Probabilistic logic
Algorithm
Jacobian matrices
Jacobi symbol
Information systems
Fermat's little theorem
Fermat
exponentiation
C\# programming language
C\# languages
Cryptography
binary exponentiation
biblio
Fake news detector algorithm works better than a human
Submitted by willirn1 on Tue, 09/10/2019 - 3:22pm
Algorithm
Articles of Interest
C3E 2019
Cognitive Security
Cognitive Security in Cyber
fake news
Cognitive Security
Articles of Interest
C3E 2019
biblio
Learning about Cyber Deception through Simulations: Predictions of Human Decision Making with Deceptive Signals in Stackelberg Security Games
Submitted by Katie Dey on Mon, 09/09/2019 - 9:36pm
ACT-R
Algorithm
Articles for Review
C3E 2019
Cognitive Architecture
Cognitive Security
Computer simulation
deception
Instance-based learning
Mind
Cognitive Security
Articles for Review
C3E 2019
biblio
Diversity and Serendipity in Recommender Systems
Submitted by grigby1 on Thu, 05/24/2018 - 11:10am
Algorithm
Human behavior
Human Factors
pubcrawl
recommender system
recommender systems
reranking
resilience
Resiliency
Scalability
« first
‹ previous
1
2
3
4
next ›
last »