Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Synchronization
biblio
A New Key Exchange Algorithm over a VLC Indoor Channel
Submitted by grigby1 on Mon, 11/19/2018 - 12:34pm
Neural Synchronization
VLC indoor channel
VLC
Visible Light Communications Security
visible light communication indoor channel
tree parity machine synchronization
Synchronization
synchronisation
stimulus vector
Scalability
Resiliency
resilience
Receivers
Public key
pubcrawl
neuronal synchronization
average synchronization time t_sync
Metrics
key exchange algorithm
indoor communication
hyperelliptic curves
GF(2n)
Galois fields
Galois field
free-space optical communication
Diffie-Hellman protocol
DH-HEMTs
cryptosystem security
Cryptography
Cryptographic Protocols
Biological neural networks
biblio
DyAdHyTM: A Low Overhead Dynamically Adaptive Hybrid Transactional Memory with Application to Large Graphs
Submitted by grigby1 on Fri, 09/28/2018 - 4:05pm
Cybersecurity
resilience
pubcrawl
Resiliency
Human behavior
policy-based governance
graph applications
hybrid transactional memory
in-memory processing
multicore
Synchronization
E-Government
biblio
Mitigating Synchronized Hardware Trojan Attacks in Smart Grids
Submitted by grigby1 on Tue, 05/01/2018 - 11:36am
hardware trojan
Human behavior
pubcrawl
resilience
Resiliency
Scalability
Smart Grid
supply chain management
supply chain security
Synchronization
biblio
Early Detection of In-the-Wild Botnet Attacks by Exploiting Network Communication Uniformity: An Empirical Study
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
Resiliency
multiple infected machines
network behaviour
network communication uniformity
outgoing bot attacks
port scanning attacks
pubcrawl
real-world spamming
resilience
Monitoring
Servers
synchronised behaviour
Synchronization
trojan horse detection
Trojan horses
unsolicited e-mail
widespread infection
botnet communication
malicious behaviour
large-scale malware propagation campaigns
invasive software
in-the-wild botnet attacks
early infection
early detection
distributed attack
cyber physical systems
computer network security
Computer crime
composability
command botnets
botnet-infected machines
botnet traffic
botnet controllers
biblio
Towards an Efficient File Synchronization between Digital Safes
Submitted by grigby1 on Mon, 03/19/2018 - 1:35pm
Protocols
WebSocket protocol
WebSocket
web services
trees (mathematics)
synchronization protocol efficiency
Synchronization
SyncDS protocol
storage management
Servers
security
Secure File Sharing
Resiliency
resilience
pubcrawl
Cloud Computing
Networking Protocol
Metrics
metadata
Human behavior
HTML5 Local Storage API
hierarchical hash tree
file synchronization
Digital Safe
Cryptographic Protocols
Context
composability
cloud storage solutions
cloud service
biblio
Distributed Self-Healing for Mobile Robot Networks with Multiple Robot Failures
Submitted by grigby1 on Mon, 03/05/2018 - 1:21pm
mobile robots
Synchronization
single robot failure
self-healing networks
Robot sensing systems
Resiliency
resilience
pubcrawl
multirobot applications
multiple robot failures
2-hop neighbor infomation
mobile robot network
maintenance engineering
fault tolerant control
failed robots
distributed self-healing algorithm
distributed control
composability
Algorithm design and analysis
biblio
Hidden attractor dynamics of a novel non-equilibrium fractional-order chaotic system and its synchronisation control
Submitted by grigby1 on Wed, 02/21/2018 - 1:45pm
Policy-Governed Secure Collaboration
non-equilibrium
nonequilibrium FOCS
nonequilibrium fractional-order chaotic system
nonlinear control
nonlinear control systems
numerical analysis
numerical simulation
Orbits
phase portraits
Policy
Metrics
pubcrawl
resilience
Resiliency
Scalability
Sensitivity
synchronisation
synchronisation control
Synchronization
Trajectory
fractal Lyapunov dimension
bifurcation analysis
bifurcation parameter
chaos
chaos based cryptology
coding information
collaboration
composability
Cryptography
cryptology
encoding
bifurcation
fractional-order chaotic system
fractional-order hidden strange attractor
hidden attractor
hidden attractor dynamics
Human behavior
human factor
Lyapunov methods
maximum likelihood estimation
maximum Lyapunov exponent spectrum
biblio
Alias-free compressed signal digitizing and recording on the basis of Event Timer
Submitted by grigby1 on Wed, 02/21/2018 - 1:45pm
non-uniform sampling
wideband signal recording
Synchronization
Spectrogram
signal sampling
signal and sinusoid crossings
Scalability
Resiliency
resilience
reference sine wave crossing
pubcrawl
Policy-Governed Secure Collaboration
Policy
picosecond resolution event timing
A033-ET event timer
Metrics
Measurement by laser beam
human factor
Human behavior
Event timing
Distance measurement
data recording
data compression
cryptology
composability
collaboration
analogue-digital conversion
alias free compressed signal digitization
biblio
The Design and Implementation of a Multicast Address Moving Target Defensive System for Internet-of-Things Applications
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
multicast communication
working IoT operating system
Synchronization
Simple Agile RPL multiCAST
SARCAST
Routing protocols
Resistance
Resiliency
Reconnaissance
pubcrawl
Protocols
operating systems (computers)
Network reconnaissance
network performance
address agility
multicast address moving target defensive system
IP networks
Internet-of-Things routing protocol
Internet-of-Things applications
Internet of Things
DRM
distributed denial-of-service attacks
DDoS Resistant Multicast
DDoS protection
DDoS Attacks
computer network security
Computer crime
computer architecture
biblio
Advanced Methodologies to Deter Internal Attacks in PTP Time Synchronization Networks
Submitted by grigby1 on Tue, 02/06/2018 - 1:59pm
network infrastructures
trusted platform modules
time synchronization supervisors
time synchronization
Synchronization
synchronisation
security
Resiliency
public key infrastructures
public key cryptography
pubcrawl
PTP time synchronization networks
Protocols
precision time protocol
network intrusion detection systems
accurate time synchronization
microsecond level
IP networks
internal attacks
industrial environments
device time synchronization
delays
cyber-attacks
Cyber Attacks
Cryptography
computer network security
computer network
composability
Clocks
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »