Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encoding
biblio
Fast HEVC Selective Encryption Scheme Based on Improved CABAC Coding Algorithm
Submitted by grigby1 on Wed, 05/05/2021 - 12:40pm
Interference
syntax elements
Syntactics
Selective Encryption
Safe Coding
Resiliency
resilience
pubcrawl
policy-based governance
Metrics
collaboration
Human Factors
Human behavior
high efficiency video coding
entropy coding
Entropy
encryption
encoding
context-based adaptive binary arithmetic coding
biblio
On Runtime Software Security of TrustZone-M Based IoT Devices
Submitted by aekwall on Mon, 05/03/2021 - 1:06pm
pubcrawl
TrustZone
software security
security
Scalability
Runtime
rop attacks
Resiliency
Random access memory
return oriented programming
Payloads
microcontroller
malware
Internet of Things
Human Factors
encoding
composability
biblio
Language-Based Web Session Integrity
Submitted by grigby1 on Tue, 04/27/2021 - 2:16pm
Servers
pubcrawl
Human behavior
resilience
Resiliency
authentication
standards
encoding
Metrics
Browsers
Compositionality
password
Browser Security
biblio
Universal Hashing for Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 4:43pm
Physical layer
wiretap coding
wiretap codes
modular coding schemes
information coding
2-universal hash family
telecommunication services
Random variables
secret key agreement
information theoretic security
Communication channels
encoding
Noise measurement
Scalability
information-theoretic security
information theory
Metrics
Cryptography
Communication system security
policy-based governance
pubcrawl
Human behavior
Resiliency
security
Receivers
private key cryptography
biblio
Gap between Theory and Practice: An Empirical Study of Security Patches in Solidity
Submitted by aekwall on Mon, 03/15/2021 - 12:07pm
contracts
vulnerability patches
Solidity team
Solidity
security patches
real-world Solidity contracts
real-world Ethereum smart contracts
potentially vulnerable contracts
missing security patches
Ethereum smart contract developers
empirical study
smart contract security
Manuals
electronic commerce
compiler security
C++ language
security of data
program compilers
Compositionality
encoding
program diagnostics
smart contracts
security vulnerabilities
static analysis
software engineering
tools
Metrics
pubcrawl
Resiliency
security
telecommunication security
Scalability
biblio
A Secure Transmission Scheme Based on Efficient Transmission Fountain Code
Submitted by aekwall on Mon, 03/15/2021 - 11:56am
legitimate receiver
Wireless communication
wireless channels
transmitter transmission efficiency
transmission efficiency
telecommunication security
simulation
security
secure transmission scheme
safe transmission
Resiliency
Receivers
pubcrawl
Metrics
Safe Coding
intercept probability
high efficiency fountain code
Fountain codes
encoding
efficient transmission fountain code
efficient coding scheme
eavesdropping
Decoding
Data Transmission
data security transmission scheme
composability
Communication system security
channel coding
biblio
Simplified Calculation of Bhattacharyya Parameters in Polar Codes
Submitted by aekwall on Mon, 03/15/2021 - 11:55am
error probability
Reliable channel
nonsystematic polar code
N polarizing channels
memoryless systems
K most reliable polarizing channels
complementary channel condition
code construction
channel reliability
calculated complexity
binary erasure channel
Bhattacharyya parameters
Bhattacharyya Parameter method
Bhattacharyya parameter
BEC channel
Maximum likelihood decoding
Resiliency
block codes
telecommunication network reliability
polar codes
error correction codes
encoding
Complexity theory
computational complexity
error statistics
channel coding
channel capacity
Reliability
Metrics
composability
pubcrawl
biblio
Automating the BGE Attack on White-Box Implementations of AES with External Encodings
Submitted by grigby1 on Thu, 03/04/2021 - 2:34pm
reverse engineering
white-box cryptography
White Box Security
white box cryptography
white box
test equipment
standards
Software systems
security
secure software
Automated Secure Software Engineering
Resiliency
resilience
pubcrawl
Metrics
Manuals
encoding
Consumer electronics
composability
biblio
LoRa Mesh Network with BeagleBone Black
Submitted by aekwall on Mon, 03/01/2021 - 4:43pm
LoRa mesh network
radio transceivers
transceivers
BeagleBone Black
BeagleBone Black wireless single-board Linux computers
chirp spread spectrum
coding rate
long range
long range transceivers
lora
spread spectrum communication
LoRa node
MESH network
Python code
receiving nodes
spread factor
transmission intervals
transmitting nodes
Wireless Mesh Network Security
Python
Internet of Things
Linux
Resiliency
pubcrawl
composability
Synchronization
Wireless communication
Metrics
IoT
Bandwidth
Mesh networks
wireless mesh networks
Computers
encoding
relay networks (telecommunication)
relay
Low power
biblio
High-Performance and Range-Supported Packet Classification Algorithm for Network Security Systems in SDN
Submitted by grigby1 on Tue, 02/23/2021 - 2:38pm
packet header bits
512-bit OpenFlow rule
Bit Vector-based packet classification methods
content-addressable storage
high clock frequency
key function
multidimensional fields
multifield matching
network security systems
Clocks
packet switching
range fields
range matching
Range Supported Bit Vector algorithm
Range-Supported packet classification algorithm
RSBV
rule sets
two-dimensional modular architecture
Communication networks
IP networks
pubcrawl
Metrics
resilience
Resiliency
computer network security
Throughput
internet
security
composability
telecommunication network routing
encoding
pattern classification
SDN
software defined networking
pipeline processing
network coding
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »