Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Force
biblio
High Efficiency Early-Complete Brute Force Elimination Method for Security Analysis of Camouflage IC
Submitted by grigby1 on Tue, 03/09/2021 - 1:37pm
Human behavior
simulation
security
reverse engineering
pubcrawl
policy-based governance
Logic gates
Intellectual Property (IP) Protection
integrated circuits
Human Factors
intellectual property security
High Efficiency
Force
Camouflage Integrated Circuit (IC)
brute force attacks
Brute Force Attack
Benchmark testing
Resiliency
composability
biblio
Trust in Medical Human-Robot Interactions based on Kinesthetic guidance
Submitted by grigby1 on Tue, 12/01/2020 - 12:35pm
patient-specific tasks
verbal mitigation strategies
usability issues
usability
Universal RoboTrainer
therapeutic robot
Task Analysis
Service robots
robust trust
Robot sensing systems
Resiliency
resilience
pubcrawl
Robot Trust
patient rehabilitation
patient arm
participant trust
medical robotics
medical human-robot interactions
kinesthetic mitigation strategies
kinesthetic guidance
human-robot interaction
Human Factors
Human behavior
Force
biomechanics
biblio
Impulse Exciter of Rotating Blades With an Increased Excitation Force
Submitted by aekwall on Mon, 11/30/2020 - 11:15am
Internet of Things
Vibrations
vibration measurement
rotating machine blades
rotating machine blade
RLC circuits
Resiliency
remanent induction reduction
remanence
pubcrawl
Permeability
Magnetization
Magnetic Remanence
Blades
increased excitation force
impulse exciter
Force
Excitation of vibration
excitation force
Electromagnets
electromagnetic vibration excitation
electromagnetic forces
electromagnetic fields
dynamic measurement and testing
cyber physical systems
Compositionality
biblio
Concept Inventories in Cybersecurity Education: An Example from Secure Programming
Submitted by grigby1 on Wed, 11/04/2020 - 1:01pm
Force
tools
testing
security of data
secure programming concept inventory
secure programming
pubcrawl
Programming profession
programming
privacy
computer science education
education
Delphi study
Cybersecurity Education Curriculum 2017 guidelines
cybersecurity education
Cybersecurity
cyber physical systems
concept inventory
computer security
biblio
Cybersecurity Associate Degree Program Curriculum
Submitted by grigby1 on Wed, 11/04/2020 - 12:43pm
knowledgeable level cybersecurity workforce
cybersecurity education programs
educational courses
Educational institutions
Force
global cybersecurity guide
Guidelines
higher education
Junior
cybersecurity education
privacy
professional field
pubcrawl
qualified cybersecurity workforce
security of data
student competency focused curriculum
Task Analysis
computer security
Accreditation
ACM CCECC
Associate Degree
associate degree cybersecurity programs
associate level cybersecurity workforce
community
community college educators
computer science education
& Technical College
CSEC2Y
curriculum
cyber physical systems
Cyber2yr
Cyber2yr work
Cybersecurity
cybersecurity associate degree program curriculum
biblio
Experimental Evaluation of Named Data Networking (NDN) in Tactical Environments
Submitted by aekwall on Tue, 09/08/2020 - 9:15am
evolutionary design approach
tactical networks
military communication
network disruptions
Information-Centric Networking (ICN)
Named Data Networking (NDN)
tactical edge networks
tactical environments
Anglova scenario emulation environment
clean slate approach
communication paradigm
TCPIP
fluctuating channel conditions
high node mobility
middleware communication solutions
NATO IST-161 RTG
NDN-based blue force tracking dissemination application
network programming model
relatively high bandwidth consumption
clean slate
policy governance
Bandwidth
mobile computing
transport protocols
Resiliency
Human behavior
pubcrawl
Metrics
Force
internet
Reliability
programming
military computing
middleware
Engines
information centric networking
ICN
named data networking
wireless channels
mobility management (mobile radio)
TCP/IP stack
biblio
Secure Authentication Mechanism for Resistance to Password Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 2:38pm
Dictionaries
brute force attacks
shoulder surfing
password based authentication mechanism
password attacks
matrix based secure authentication mechanism
Matrix based authentication
key stroke technique
graphichical password technique
dictionary attacks
click pattern technique
Brute forcing
Cryptography
Resists
matrix algebra
policy-based governance
Human Factors
password
Force
pubcrawl
authentication
Indexes
authorisation
biblio
DOS and Brute Force Attacks Faults Detection Using an Optimised Fuzzy C-Means
Submitted by grigby1 on Fri, 09/04/2020 - 2:37pm
DOS brute force attacks faults detection
brute force attacks
Subtractive Clustering
specialised MIB dataset
SNMP-MIB variables
SNMP-MIB parameter datasets
SFCM method
optimised fuzzy c-means
network performance
network issues
Network Fault Attacks
MIB feature
Management information base
Fuzzy Cluster Means
Fault Clustering
Servers
computer networks
computer network systems
clustering methods
Clustering algorithms
fault detection
policy-based governance
Human Factors
network administrators
fuzzy set theory
Force
pubcrawl
Protocols
computer network security
biblio
High Speed Parallel RC4 Key Searching Brute Force Attack Based on FPGA
Submitted by grigby1 on Fri, 09/04/2020 - 2:36pm
Hardware
Xilinx XC3S1600E-4 FPGA device
stream cipher
RC4 algorithm
RC4
random-access storage
pubcrawl
process control
policy-based governance
on-chip BRAM
main controller
key searching unit
key searching speed
Human Factors
High Speed Parallel RC4 Key Searching Brute Force Attack
block RAM
frequency 128 MHz
FPGA
forecast keying methods
Force
field programmable gate arrays
field programmable gate array
encryption
Cryptography
Clocks
clock rate
Ciphers
brute force attacks
Brute force
biblio
An Approach to Fault Tolerant Key Generation and Secure Spread Spectrum Communiction
Submitted by grigby1 on Fri, 09/04/2020 - 2:25pm
fault tolerant key generation
brute force attacks
Wireless communications
spread spectrum communication
sensor networks
Security parameters
secure spread spectrum communication
Secure Spread Spectrum
mobile ad hoc networks
mobile ad hoc network
level message security
level encryption securities
key generation
group key generation algorithms
Fault tolerant systems
Cryptography
complex Random key generation algorithms
client side encryption
attacks
fault tolerance
Brute Force Attack
AES
policy-based governance
Human Factors
Force
collaboration
pubcrawl
telecommunication security
Wireless communication
Servers
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »