Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Synchronization
biblio
Implicit Authentication in Neural Key Exchange Based on the Randomization of the Public Blockchain
Submitted by grigby1 on Tue, 04/27/2021 - 2:20pm
authenticated key exchange
authentication
blockchain
neural key exchange
Neural networks
Periodic structures
Protocols
pubcrawl
Public key
resilience
Resiliency
Scalability
security
Synchronization
biblio
Blockchain-based open infrastructure for URL filtering in an Internet browser
Submitted by grigby1 on Tue, 04/27/2021 - 2:15pm
Metrics
URL filtering
optimum block size
Internet security
Uniform resource locators
Synchronization
Browser Security
Compositionality
Browsers
Organizations
smart contracts
blockchain
Prototypes
internet
Resiliency
resilience
Human behavior
pubcrawl
biblio
Securing Asynchronous Exceptions
Submitted by aekwall on Mon, 03/15/2021 - 12:09pm
Libraries
Theorem Proving
telecommunication security
Synchronization
security of data
security
Runtime system
Runtime
pubcrawl
programming language semantics
programming
program verification
program invariants
program diagnostics
program compilers
Metrics
pattern locks
language-based information-flow control techniques
language constructs
Instruction sets
IFC language
features asynchronous exceptions
different covert channels
data structures
Concurrent computing
concurrency control
Compositionality
compiler security
Resiliency
Scalability
Human behavior
biblio
How to Securely Prune Bitcoin’s Blockchain
Submitted by grigby1 on Tue, 03/09/2021 - 2:50pm
financial data processing
velvet fork
Synchronization
snapshots
serious scalability issues
security
securely prune Bitcoin's blockchain
Scalability
pubcrawl
Peer-to-peer computing
Human behavior
bitcoin
electronic money
decentralized cryptocurrency
Cryptography
CoinPrune
bootstrapping
blockchain size
blockchain
block pruning
Bitcoin network
biblio
LoRa Mesh Network with BeagleBone Black
Submitted by aekwall on Mon, 03/01/2021 - 4:43pm
LoRa mesh network
radio transceivers
transceivers
BeagleBone Black
BeagleBone Black wireless single-board Linux computers
chirp spread spectrum
coding rate
long range
long range transceivers
lora
spread spectrum communication
LoRa node
MESH network
Python code
receiving nodes
spread factor
transmission intervals
transmitting nodes
Wireless Mesh Network Security
Python
Internet of Things
Linux
Resiliency
pubcrawl
composability
Synchronization
Wireless communication
Metrics
IoT
Bandwidth
Mesh networks
wireless mesh networks
Computers
encoding
relay networks (telecommunication)
relay
Low power
biblio
Decentralized Identifier Distribution for Moving Target Defense and Beyond
Submitted by grigby1 on Tue, 02/23/2021 - 2:56pm
network security
unique universal identifiers
Twitter
timestamp-based concurrency control algorithms
Synchronization
synchronisation
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Protocols
protocol
proactive defense
network security objectives
Concurrency
Network reconnaissance
Network Identification
network entity identifiers
moving target defense
IP networks
decentralized identifier distribution
Databases
Cryptography
cryptographically secure random values
Cryptographic Protocols
concurrency control
collision probability
security
biblio
Practical Implementation of APTs on PTP Time Synchronisation Networks
Submitted by grigby1 on Fri, 01/22/2021 - 2:39pm
synchronisation
PTP time synchronisation networks
PTP infrastructure components
PTP
programmable Man-in-the-Middle
programmable injector device
precision time protocol
IEEE 1588
computer clocks
advanced persistent threats
Clocks
Degradation
Synchronization
cyber-attacks
security of data
APT
advanced persistent threat
malware
delays
Protocols
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
security
Cyber-security
biblio
FPGA Implementation of Internet Key Exchange Based on Chaotic Cryptosystem
Submitted by grigby1 on Fri, 01/22/2021 - 1:52pm
IKE protocol
word length 128 bit
Synchronization
security association attack
securing communications
SA
Protocols
network protocol
network communication domain
man in the middle attack
keys phase exchange
IPSec protocol
IPsec
Internet key exchange protocol
internet
chaotic cryptography
IKE
FPGA implementation
FPGA
field programmable gate arrays
DH-HEMTs
data phase transfer
Cryptography
Cryptographic Protocols
computer network security
chaotic cryptosystem solution
chaotic cryptosystem
chaotic communication
4-dimension chaotic system
pubcrawl
biblio
Cryptography by Synchronization of Hopfield Neural Networks that Simulate Chaotic Signals Generated by the Human Body
Submitted by grigby1 on Fri, 01/22/2021 - 1:50pm
FPGA
Synchronization
synchronisation
reconfigurable hardware
reconfigurable architectures
random number sequence
random number generation
Neural networks
information security
human body
Hopfield neural networks
Hopfield neural nets
chaotic cryptography
field programmable gate arrays
encryption circuit
Dynamical Systems
dynamic systems
Cryptography
chaotic synchronization
chaotic signal simulation
chaotic communication
asymmetric cryptography method
pubcrawl
biblio
Bluetooth devices fingerprinting using low cost SDR
Submitted by grigby1 on Mon, 12/28/2020 - 12:29pm
Clocks
wireless security
wireless communication scheme
transmitters identification
Software Defined Radios
physical-layer fingerprinting approach
low cost SDR
communication protocol
Bluetooth scan
Bluetooth devices fingerprinting
authentication layer
software radio
bluetooth security
Bluetooth
Physical layer
Synchronization
fingerprint identification
composability
Wireless communication
Communication system security
Protocols
telecommunication security
Resiliency
resilience
Human behavior
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »