Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Time complexity
biblio
Algebraic Decision Diagram-Based CP-ABE with Constant Secret and Fast Decryption
Submitted by aekwall on Tue, 05/25/2021 - 3:19pm
Scalability
encryption
Access Control
pubcrawl
policy-based governance
law enforcement
Knowledge Discovery
distributed computing
Time complexity
CP-ABE
ciphertext-policy attribute-based encryption
Algebraic Decision Diagram
Constant Secret
fast decryption
pseudo-Boolean function
Systems support
biblio
Randomized Least Frequently Used Cache Replacement Strategy for Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 1:35pm
computer science
Tree network topologies
Randomized LFU
Internet requirements
ICN primary features
content replacement scheme
computer network
caching strategy
caching algorithms
Cache Replacement Strategy
Abilene network topologies
named data network
in-network caching
Time complexity
cache storage
information-centric networking
Scalability
named data networking
network performance
telecommunication network topology
delays
network traffic
trees (mathematics)
internet
convergence
Computational modeling
simulation
pubcrawl
Human behavior
Resiliency
telecommunication traffic
biblio
Protect white-box AES to resist table composition attacks
Submitted by aekwall on Mon, 07/20/2020 - 10:54am
cryptographic software protection
white box cryptography
white-box cryptography
white-box attack context
white-box AES protection
WBAC
Time complexity
table-composition-targeting white-box attacks
table-composition-targeting cryptanalysis techniques
key-embedding lookup tables
key recovery attacks
De Mulder et al.'s attack
Resiliency
Billet et al.'s attack
affine mappings
Table lookup
Secret key
computational complexity
public key cryptography
Data protection
Metrics
composability
pubcrawl
biblio
A Hybrid Packet Classification Algorithm Based on Hash Table and Geometric Space Partition
Submitted by aekwall on Mon, 06/08/2020 - 11:33am
high-speed packet classification requirement
classification speed
complex network conditions
existing classification schemes
geometric space partition
hash
hash matching
hash table
HGSP algorithm
classification performance
huge packets
hybrid packet classification algorithm
integrated space-ground network
ISGN
packet classification
tradition network
traditional Hicuts algorithm
hash algorithms
Communication networks
Memory management
security
Classification algorithms
network security
Resiliency
pubcrawl
pattern classification
pattern matching
computer network security
Decision trees
aerospace computing
Partitioning algorithms
Compositionality
tree data structures
Time complexity
aerospace communication
biblio
Parallel Implementation of K-Nearest-Neighbors for Face Recognition
Submitted by grigby1 on Fri, 05/22/2020 - 2:39pm
graphics processing units
Time complexity
parallel CUDA implementation
parallel architectures
KNN classifier
k-nearest-neighbours classifier
Instruction sets
countless classification algorithms
nearest neighbor search
Sorting
pubcrawl
image classification
face recognition
nearest neighbour methods
Measurement
Metrics
Classification algorithms
pattern classification
Indexes
biblio
Network Intrusion Detection Using Improved Genetic k-means Algorithm
Submitted by aekwall on Mon, 05/11/2020 - 11:12am
k-means++ algorithm
Training
Time complexity
Resiliency
pubcrawl
Prediction algorithms
personal privacy theft
pattern clustering
Partitioning algorithms
network intrusion detection
network intrusion
Metrics
KDD-99 dataset
KDD-99
Clustering algorithms
intrusion detection system
Intrusion Detection
internet
IGKM algorithm
IGKM
Genetics
genetic k-means algorithm
genetic algorithms
data privacy
computer network security
computer network
composability
biblio
Managing Security Policies within Cloud Environments Using Aspect-Oriented State Machines
Submitted by grigby1 on Fri, 04/03/2020 - 12:05pm
pubcrawl
formal verification
high level languages
middleware
middleware service
multitenancy architecture
Openstack cloud environment
Organizations
policy anomalies
Policy Based Governance
finite state machines
safety problems
security
security policies anomalies
security policy management
space complexity
specification languages
Time complexity
verification tools
XACML policies
Cloud Computing
Anomaly Detection
Anomaly Detection and Resolution
AO-FSM
aspect-oriented finite state machines
Aspect-oriented programming
aspect-oriented state machines
authorisation
automata
availability problems
access control policy management
cloud environments
cloud policy verification service
cloud service
collaboration
computer architecture
conflicts
distributed policy management
domain-specific language state machine artifacts
biblio
A Hybrid Algorithm for Influence Maximization of Social Networks
Submitted by grigby1 on Wed, 03/18/2020 - 12:27pm
NP problem
Secure File Sharing
resilience
Resiliency
pubcrawl
wikipedia
voting situation
Time complexity
social networks
social networking (online)
social network
Peer-to-peer computing
optimisation
optimal solution
Big Data
influence maximization
hybrid distribution value accumulation algorithm
Hybrid algorithm
hill climbing
Heuristic algorithms
greedy algorithms
greedy algorithm
Gnutella node-to-node file sharing network
Encyclopedias
dissemination process
dissemination effect
computational complexity
activation effect
biblio
Realization of RSA Cryptographic Algorithm Based on Vector-Module Method of Modular Exponention
Submitted by grigby1 on Mon, 12/30/2019 - 2:18pm
pubcrawl
Vectors
vector-module method
vector-modular method
Time complexity
temporal complexity
Scalability
RSA cryptosystem
RSA cryptographic algorithm
Resiliency
public key cryptography
computational complexity
Modular Multiplication
modular exponention
modular exponentiation
graph theory
exponentiation
encryption
Economics
Decoding
computer security
biblio
Hybrid Approach for Intrusion Detection Using Fuzzy Association Rules
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
reduced dataset
Intrusion Detection
intrusion detection system
Metrics
misuse detection
network technologies
pattern clustering
pubcrawl
rapid development
Internet rapid development
resilience
Resiliency
security
security of data
Time complexity
Training
weighted fuzzy C-mean clustering algorithm
Anomaly Detection
input data space
hybrid approach
Fuzzy sets
fuzzy set theory
fuzzy logic scheme
Fuzzy logic
fuzzy association rules
feature extraction
deep learning
decrease resource utilization
Decision Making
considerable increase
computer networks
Clustering algorithms
anomaly intrusions
« first
‹ previous
1
2
3
next ›
last »