Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital signatures
biblio
IoT Denial-of-Service Attack Detection and Prevention Using Hybrid IDS
Submitted by grigby1 on Tue, 12/01/2020 - 1:45pm
Internet of Things
Signature-based IDS
Signature-based
security issues
Resiliency
resilience
pattern classification
network packet classification
IoT DoS
IoT denial-of-service attack detection
intrusion detection system
intrusion detection and prevention systems
pubcrawl
IDS
IDPS
hybrid IDS
DoS Attack Detection
digital signatures
computer network security
composability
anomaly-based IDS
Anomaly-based
ACL
biblio
Low-Overhead Robust RTL Signature for DSP Core Protection: New Paradigm for Smart CE Design
Submitted by aekwall on Mon, 11/09/2020 - 1:41pm
low-overhead robust RTL signature
FIR filters
IP piracy
flip-flops
covert signature embedding process
digital signal processor
DSP core protection
DSP-MP IP core
IP vendors
FIR filter
Multimedia Processor
nonsignature FIR RTL design
register-transfer level
reusable Intellectual Property cores
robust IP owner
secured smart CE device
smart CE design
smart Consumer Electronics devices
Registers
Hardware
Resiliency
pubcrawl
composability
policy-based governance
digital signatures
microprocessor chips
Multiplexing
IP networks
digital signal processing chips
Finite impulse response filters
adders
logic circuits
logic design
Latches
Consumer electronics
biblio
Hardware Steganography for IP Core Protection of Fault Secured DSP Cores
Submitted by aekwall on Mon, 11/09/2020 - 1:40pm
DSP based IP cores
vendor defined signature
transient fault secured IP cores
signature size
signature free approach
multimedia cores
IP core protection
IP core
high level synthesis
hardware steganography
fault secured DSP cores
Fault secure
entropy value
entropy thresholding
encoding rule
Resiliency
colored interval graph
IP piracy
Steganography
DSP
logic design
digital signal processing chips
Watermarking
industrial property
digital signatures
Entropy
graph theory
policy-based governance
composability
pubcrawl
biblio
Robust Digital Signature to Protect IP Core against Fraudulent Ownership and Cloning
Submitted by grigby1 on Mon, 11/02/2020 - 12:30pm
IP cloning
watermarking approach
system-on-chips
system-on-chip
synthesis
robust digital signature
Resiliency
resilience
pubcrawl
Protection.
policy-based governance
multiple security modules
multimedia based reusable Intellectual property cores
IP core
composability
intellectual property security
industrial property
fraudulent ownership
encryption
encoding
DSP
digital signatures
digital signature processing cores
digital signature
digital signal processing chips
Cryptography
crypto digital signature approach
consumer electronic devices
biblio
Enhancing Security in Medical Image Informatics with Various Attacks
Submitted by aekwall on Mon, 10/19/2020 - 12:00pm
Metrics
medical data
Medical Expert biometric information
Medical Expert Communication
medical image authentication
Medical image compression
Medical image informatics
medical image processing
medical information systems
Kerberos
National Institute of Health
NIH
pubcrawl
Region of Interest and Non-Interest
Resiliency
reversible watermarking
surgery
telemedicine
electronic patient record
authorisation
authorized medical experts
Aycan sample digital images
Cryptography
digital signature
digital signatures
digital watermarking
diseases
Arnold’s Cat Map
EPR
extraction process
Human behavior
image archives
Image coding
image watermarking
internet
biblio
Securing connection between IT and OT: the Fog Intrusion Detection System prospective
Submitted by grigby1 on Fri, 10/16/2020 - 11:32am
proprietary protocols
Internet of Things
Intrusion Detection
intrusion detection system
legacy systems
Monitoring
New Implementation Approaches
operational technology network
production engineering computing
information technology network
Protocols
pubcrawl
resilience
Resiliency
SCADA systems
Scalability
security of data
tools
fog intrusion detection system
Anomaly Detection
common signature based intrusion detection system
cyberattack
Cybersecurity
deep packet inspection
digital signatures
distributed processing
Fog computing
anomaly based features
ICs
industrial control
industrial control system
Industrial Control Systems
Industrial Informatics
Industrial Internet of Things
industrial IoT devices
biblio
E-Government - Qualified Digital Signature Case Study
Submitted by grigby1 on Fri, 10/16/2020 - 11:14am
institutional websites
Web sites
security
Resiliency
resilience
qualified digital signature case
Qualified Digital Signature
pubcrawl
Portable document format
policy-based governance
Leiria
Law
Instruments
Autenticity
Human behavior
government data processing
Germanium
Electronic government
E-Government
documentation
digital signatures
digital format
Cybersecurity
computer application
collaboration
biblio
Improved Veron Identification and Signature Schemes in the Rank Metric
Submitted by grigby1 on Tue, 10/06/2020 - 1:51pm
probability
veron identification
Transforms
smallest signature
signature size
Security Metrics
secure signature scheme
rank metric
random oracle model
quantum cryptography
quantum computing
public key size
public key cryptography
pubcrawl
Protocols
cheating probability
Metrics
Measurement
linear codes
identification protocol
Fiat-Shamir transform
error-correcting codes
error correction codes
double circulant codes
digital signatures
Decoding
Cryptography
Computing Theory
code-based signature schemes
biblio
DeMetrA - Decentralized Metering with user Anonymity and layered privacy on Blockchain
Submitted by aekwall on Mon, 09/21/2020 - 3:50pm
market value
cars
adversarial modifications
Decentralized Metering
DeMetrA - decentralized metering
Distributed Database
DSLRs
identity-based cryptography
identity-based signatures
layered encoding
cyber physical systems
odometer fraud
odometers
practical concern
product attributes
pseudonym
reported values
shutter counters
specific counters
Control Theory and Privacy
privacy
Scalability
Cryptography
data privacy
History
Protocols
malicious modification
Resiliency
Human behavior
pubcrawl
automobiles
blockchain
Distributed databases
cyber-physical systems
digital signatures
Public key
blockchain technology
user anonymity
Europe
biblio
The Cryptocurrency Simulation using Elliptic Curve Cryptography Algorithm in Mining Process from Normal, Failed, and Fake Bitcoin Transactions
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
ECC algorithm
transaction process
total processing time
time 6.0 s
time 152.0 s
securing transactions
scenario
RSA processing time
RSA algorithm
normal bitcoin transactions
mining process
high-level security
fake bitcoin transactions
Elliptic Curve Cryptography algorithm
Elliptic curve cryptography (ECC)
efficient processing time
Scalability
cryptography algorithms
cryptocurrency transaction
cryptocurrency simulation
Cryptocurrency security
appropriate algorithm
transaction processing
bitcoin security
bitcoin
cryptocurrency
security level
Human behavior
pubcrawl
public key cryptography
digital signatures
Cryptography
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »