Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Conferences
biblio
Speeding Up Encryption on IoT Devices Using Homomorphic Encryption
Submitted by grigby1 on Thu, 06/09/2022 - 2:42pm
Metrics
Somewhat Homomorphic Encryption
Human Factors
fully homomorphic encryption
Home appliances
Homomorphic encryption
statistical analysis
smartphone
public key cryptography
pubcrawl
Portable computers
Computers
Scalability
IoT device
performance evaluation
Conferences
Resiliency
resilience
biblio
Perfect Tabular Hashing in Pseudolinear Time
Submitted by grigby1 on Thu, 06/09/2022 - 2:37pm
pubcrawl
resilience
Conferences
Prototypes
Compositionality
hash table
Time complexity
Hash Function
Hash functions
hash algorithms
Resiliency
2SAT
perfect hashing
SAT
tabulation hashing
biblio
Honeypot Allocation for Cyber Deception in Internet of Battlefield Things Systems
Submitted by grigby1 on Thu, 06/09/2022 - 2:33pm
pubcrawl
resilience
Resiliency
Conferences
Scalability
internet
military communication
Games
network topology
Numerical models
Nash Equilibrium
iobt
Human Factors
biblio
LiONv2: An Experimental Network Construction Tool Considering Disaggregation of Network Configuration and Device Configuration
Submitted by grigby1 on Thu, 06/09/2022 - 2:22pm
Metrics
YANG
NETCONF
L3 protocol agnostic
infrastructure as code
Experimental network
Human Factors
Resiliency
Time measurement
Focusing
Internet-scale Computing Security
Compositionality
tools
network topology
Libraries
composability
Protocols
Scalability
Conferences
resilience
collaboration
policy-based governance
Human behavior
pubcrawl
biblio
IDS Performance Analysis using Anomaly-based Detection Method for DOS Attack
Submitted by aekwall on Thu, 06/09/2022 - 11:07am
Intrusion Detection
Internet of Things
tools
Conferences
Resiliency
composability
testing
Performance analysis
Cybersecurity
intrusion detection system
denial of service
Web servers
pubcrawl
IDS
Anomaly-based
biblio
Leveraging Edge Computing and Differential Privacy to Securely Enable Industrial Cloud Collaboration Along the Value Chain
Submitted by grigby1 on Wed, 06/08/2022 - 10:21am
collaboration
pubcrawl
policy-based governance
resilience
Resiliency
Conferences
composability
real-time systems
edge computing
Stability analysis
intellectual property
Data processing
differential privacy
anonymization
intellectual property security
chatter analysis
biblio
Insider Threat Detection Based on User Historical Behavior and Attention Mechanism
Submitted by grigby1 on Tue, 06/07/2022 - 11:08am
Recurrent neural networks
insider threat
data science
attention mechanism
Cyberspace
Metrics
Data mining
composability
History
Organizations
Conferences
policy-based governance
Human behavior
pubcrawl
Neural networks
Insider Threat Detection
Anomaly Detection
biblio
Exploring the Benefits of Memory-Limited Fulcrum Recoding for Heterogeneous Nodes
Submitted by grigby1 on Mon, 06/06/2022 - 1:08pm
pubcrawl
Conferences
encoding
Receivers
Decoding
network coding
spread spectrum communication
Limiting
human in the loop
Human Factors
Fulcrum codes
Global communication
heterogeneity
biblio
Visual Decision-Support for Live Digital Forensics
Submitted by grigby1 on Mon, 06/06/2022 - 12:15pm
Metrics
Visualization systems and tools
visualization
visual analytics
tools
security and privacy
security
Scalability
Resiliency
resilience
pubcrawl
Prototypes
expert systems
Intrusion Detection Systems
human-centered computing
Human behavior
Digital Forensics
Decision Making
Data visualization
Conferences
Computer Forensics
Applied Computing
privacy
biblio
Evaluation and Enhancement of the Actionability of Publicly Available Cyber Threat Information in Digital Forensics
Submitted by grigby1 on Mon, 06/06/2022 - 12:10pm
information forensics
Actionable Cyber Threat Information
Autopsy
Compositionality
Conferences
Digital Forensics
Electronic mail
Incident Investigation
Information Reuse
Object recognition
Phishing
pubcrawl
Resiliency
security
STIX
tools
« first
‹ previous
…
23
24
25
26
27
28
29
30
31
…
next ›
last »