Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
optimisation
biblio
An Image Encryption Schema Based on Hybrid Optimized Chaotic System
Submitted by grigby1 on Fri, 01/22/2021 - 12:50pm
hybrid optimized chaotic system
Security analysis
probability density
optimized henon mapping
optimized henon
optimisation
new 2d-logistic chaotic System
Lyapunov exponents
Logistics
image encryption schema
image encryption
image cryptosystem
Image coding
chaotic cryptography
Histograms
Henon mapping
henon chaotic system
encryption
Cryptography
Correlation
compounded chaotic system
chaotic image encryption algorithm
chaotic communication
chaos
2D logistic chaotic system
pubcrawl
biblio
JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets
Submitted by grigby1 on Wed, 01/20/2021 - 3:21pm
proprietary manufacturer-specific APIs
low-level cryptographic primitives
memory footprint
nondisclosure agreements
open code sharing
open library
open systems
open-source development
open-source licenses
optimisation
optimization
proprietary APIs
low-level cryptographic operations
pubcrawl
public domain software
resilience
Resiliency
resource-constrained platforms
smart cards
smartcards
software libraries
standards
transparency
wrapper cryptographic library
Elliptic curves
APIs
application program interfaces
application programming interface
auditability
Big Integers
certification
certification transparency
Compositionality
Cryptography
data types
elliptic curve operations
API
generic library
Hardware
interoperability
Java
JavaCard
JavaCard API
JavaCard applets
JavaCard multiapplication platform
JCMathLib
Libraries
biblio
Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis
Submitted by aekwall on Mon, 01/18/2021 - 10:25am
optimisation
Fuzzy Cryptography
YARA rule conditions
rule optimisation process
Performance Optimisation
YARA rules
Fuzzy Hashing
fuzzy rules
Fuzzy sets
fuzzy set theory
Fuzzy logic
Malware Analysis
Scalability
pattern matching
optimization
standards
Metrics
Cryptography
Ransomware
pubcrawl
Resiliency
invasive software
malware
biblio
Modified Grey Wolf Optimization(GWO) based Accident Deterrence in Internet of Things (IoT) enabled Mining Industry
Submitted by aekwall on Mon, 01/11/2021 - 12:38pm
patient monitoring
occupational safety
occupational health
mining industry
mine workers
Introduction
industrial accidents
Heart rate
health conditions
accident deterrence
Accident
grey wolf optimization
grey systems
IoT
Deterrence
Personnel
computerised monitoring
optimisation
production engineering computing
pubcrawl
Human behavior
Resiliency
Internet of Things (IoT)
Internet of Things
Scalability
biblio
Synthesis and Realization of Chebyshev Filters Based on Constant Electromechanical Coupling Coefficient Acoustic Wave Resonators
Submitted by aekwall on Mon, 12/21/2020 - 12:31pm
Cost function
Surface acoustic waves
surface acoustic wave resonator filters
surface acoustic wave filter
SAW filters
piezoelectric substrate
Optimization methods
Microwave filters
microwave communication
lithium tantalate substrate
lithium compounds
LiTaO3
global positioning system frequency band
crystal filters
Scalability
constant electromechanical coupling coefficient acoustic wave resonators
Chebyshev filters
optimization algorithm
Band-pass filters
acoustic coupling
acoustic wave
GPS
optimisation
Global Positioning System
pubcrawl
Human behavior
Resiliency
biblio
Approximate Probabilistic Security for Networked Multi-Robot Systems
Submitted by grigby1 on Thu, 12/17/2020 - 12:38pm
multipoint optimization
security
Robot sensing systems
robot operating systems
Resiliency
resilience
pubcrawl
probability
Probabilistic logic
policy-based governance
optimisation
optimal subset
online optimization
Observers
networked multirobot systems
networked control systems
approximate probabilistic security
multi-robot systems
MRS
lower bound estimate
left invertiblility
Human Factors
Human behavior
graph theory
exact probability
disjoint path sets
control system security
computational complexity
combinatorial optimization problem
Boolean functions
binary decision diagrams
biblio
On Some Universally Good Fractional Repetition Codes
Submitted by grigby1 on Tue, 12/15/2020 - 12:26pm
data storage
universally good Fractional Repetition codes
partial regular graph
multidimensional optimization problem
minimum distance bound
heterogeneous DSS
encoded packet replication
distributed storage systems
Data storage systems
storage overhead
coding theory
network coding
network theory (graphs)
pubcrawl
Compositionality
optimisation
computer network reliability
network security
storage management
Cryptography
security
optimization
computer network security
Resiliency
resilience
Metrics
biblio
The Study and Application of Security Control Plan Incorporating Frequency Stability (SCPIFS) in CPS-Featured Interconnected Asynchronous Grids
Submitted by grigby1 on Fri, 12/11/2020 - 1:42pm
Resiliency
power engineering computing
power grids
power system interconnection
power system security
power system stability
power transmission planning
pubcrawl
real-time systems
resilience
optimisation
Scalability
SCPIFS
security
Security Control
security control plan
security control strategy
Stability analysis
Time Frequency Analysis
HVDC power transmission
bulk power imbalance shock
CPS
Cyber Physical System
cyber-physical systems
frequency control
frequency stability
frequency stability constrains
frequency stability domain
Generators
ADMM
HVDC tie-line
HVDC tie-line transferred power
HVDC transmission
interconnected asynchronous grids
interconneted grids
load shedding
McCormick envelope method
Metrics
biblio
User Credibility Assessment Based on Trust Propagation in Microblog
Submitted by grigby1 on Wed, 12/02/2020 - 1:15pm
online social network
user social relationship graph
user credibility assessment
Uniform resource locators
two-way propagation trust scoring
trustworthiness-based user credibility evaluation algorithm
Trusted Computing
trust propagation
trust
social networking (online)
Social network services
seed node selection algorithm
pubcrawl
pruning algorithm
optimisation
online social networking platform
Clustering algorithms
network topology
microblog user credibility evaluation algorithm
Microblog platform
microblog
Manuals
malicious users
low trusted user
Human Factors
Human behavior
graph theory
feature extraction
Fans
false social relationships
Computing Theory
biblio
Machine Learning-Driven Trust Prediction for MEC-Based IoT Services
Submitted by grigby1 on Wed, 12/02/2020 - 1:14pm
Predictive models
MEC-environments
mobile computing
Mobile Edge Computing
network Lasso problem
network topology
optimisation
optimization
pattern clustering
MEC-based IoT systems
pubcrawl
sensor services
simultaneous clustering
Topology
trust
Trusted Computing
trustworthiness
IoT systems
Computing Theory
distributed machine-learning architecture
distributed trust prediction model
graph theory
Human behavior
Human Factors
Internet of Things
Internet of Things services
alternate direction method of multipliers
large-scale networked-graphs
learning (artificial intelligence)
machine learning
machine learning-driven trust prediction
machine-learning architecture models
Mathematical model
MEC-based IoT services
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »