Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encoding
biblio
A Nonlinear White-Box SM4 Implementation Applied to Edge IoT Agents
Submitted by aekwall on Sun, 10/16/2022 - 6:29pm
pubcrawl
white-box implementation
white-box cryptography
white box cryptography
system integration
Software algorithms
SM4 algorithm
Resists
Resiliency
composability
Power system dynamics
Metrics
Memory management
Heuristic algorithms
evaluation indicators
encoding
edge IOT agents
biblio
Security Enhancing and Probability Shaping Coordinated Optimization for CAP-PON in Physical Layer
Submitted by aekwall on Sun, 10/16/2022 - 6:11pm
security
encryption
pubcrawl
Metrics
Resiliency
composability
encoding
Probabilistic logic
Physical layer
physical layer security
Photonics
DNA
biblio
Named Entity Recognition Method in Network Security Domain Based on BERT-BiLSTM-CRF
Submitted by grigby1 on Thu, 10/06/2022 - 3:21pm
resilience
CRF
BiLSTM
BERT
Resiliency
Text recognition
Communications technology
Knowledge engineering
Named Data Network Security
named entity recognition
pubcrawl
Cybersecurity
network security
encoding
Data models
Scalability
Conferences
Human Factors
Human behavior
biblio
Sensing with Random Encoding for Enhanced Security in Embedded Systems
Submitted by grigby1 on Fri, 09/30/2022 - 3:56pm
Hardware Security
random sensing
random encoding
ios
iOS Security
telemetry
Resiliency
Satellites
hardware trojan
timing
security
Compositionality
Trojan horses
encoding
sensors
resilience
Metrics
Human Factors
pubcrawl
biblio
LICE: Lightweight certificate enrollment for IoT using application layer security
Submitted by aekwall on Fri, 09/30/2022 - 2:47pm
IoT security
radio networks
public key infrastructure
PKI
OSCORE
enrollment
EDHOC
Digital certificate
cbor
embedded systems
Internet security
Hardware
network security
encoding
composability
Human behavior
Resiliency
Metrics
pubcrawl
Public key
Protocols
IoT
biblio
Algorithmic method of security of the Internet of Things based on steganographic coding
Submitted by aekwall on Fri, 09/30/2022 - 2:45pm
mechatronics
stego image
RGB
PSNR
LSB
Histogram
grayscale metod
Color
Steganography
Gray-scale
information security
IoT security
encoding
composability
Human behavior
Resiliency
Metrics
pubcrawl
Conferences
IoT
biblio
An Energy-saving Approach for Error control Codes in Wireless Sensor Networks
Submitted by grigby1 on Fri, 09/16/2022 - 4:54pm
security
pubcrawl
Metrics
wireless sensor networks
Wireless communication
composability
encoding
energy resources
energy consumption
forward error correction
Bit error rate
channel coding
Resiliency
BCH
Error-correcting codes (ECC)
wireless sensor networks (WSN)
biblio
Artificial Conversational Agent using Robust Adversarial Reinforcement Learning
Submitted by aekwall on Fri, 08/26/2022 - 12:04pm
Neural networks
Computational modeling
tools
pubcrawl
Scalability
Metrics
Human behavior
encoding
Reinforcement learning
Manuals
conversational agents
Stochastic processes
conversational agent
Long Short Term Memory (LSTM)
Seq2Seq Model
biblio
Two-layer Coded Gradient Aggregation with Straggling Communication Links
Submitted by grigby1 on Fri, 08/26/2022 - 10:49am
Servers
pubcrawl
resilience
Resiliency
Data models
composability
encoding
Compositionality
Distributed databases
distributed learning
Computing Theory
Coding computing
computer aided instruction
distance learning
Downlink
straggling
biblio
Impact of Coding Styles on Behaviours of Static Analysis Tools for Web Applications
Submitted by aekwall on Fri, 08/12/2022 - 4:09pm
static code analysis
Human behavior
composability
Resiliency
coding styles
composabiity
cross-site scripting
Electronic mail
encoding
pubcrawl
Registers
software security
static analysis
static analysis tools
tools
web vulnerabilities
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »