Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information technology
biblio
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
Submitted by aekwall on Tue, 09/08/2020 - 10:12am
chaotic system
traditional cryptography algorithms
symmetric encryption
symmetric cipher
Salsa20
pseudorandom keys
NIST suite
hybrid modified lightweight algorithm
generated sequence keys
cryptography algorithms PRESENT
cipher algorithm
block ciphers
2D logistic map
lightweight cryptography
data communication
chaotic cryptography
Cryptography
chaotic communication
Predictive Metrics
information technology
stream cipher
Ciphers
Constrained Devices
Information systems
computational complexity
NIST
composability
pubcrawl
Resiliency
Classification algorithms
encryption
biblio
Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
pubcrawl
tactical risk
Software Vulnerability
software fault tolerance
Servers
security of data
security
Safety
risk management
risk analysis
resource management
Resiliency
resilience
random system faults
CPS resilience
optimal cyber defense remediation
operational technology
Operational Resilience
operational impact assessment
information technology
graph theory
fault graph-based model
Erbium
data-driven attack graph
Damage Assessment
cyber-physical systems
cyber threats
cyber physical systems
biblio
Research on Improving Network Security of Embedded System
Submitted by aekwall on Mon, 06/15/2020 - 10:55am
information technology
Servers
Resiliency
pubcrawl
promotion countermeasures
network security
network attack
mobile embedded systems
Metrics
IPsec
internet
authentication
embedded systems
embedded system network
Embedded System
embedded network security
computer technology
computer network security
composability
Communication networks
certification
brand-new computer technology
biblio
Encryption Based On Multilevel Security for Relational Database EBMSR
Submitted by aekwall on Mon, 04/20/2020 - 10:44am
Ciphers
Relational Database
multisecurity level
multilevel security model
Multi level
MLS
encryption algorithm
DBMS
cryptosystem
Bell LaPadula
RC4
AES
DES
relational database security
Cryptography
information technology
relational databases
internet
Databases
standards
Metrics
composability
pubcrawl
Human behavior
Resiliency
decryption
encryption
biblio
Study on Security Technology of Internet of Things Based on Network Coding
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
network coding
traditional network technology
Satellites
prefect information secure condition
max-flow
information secure network coding scheme
information network
eavesdropping adversaries
cyber physical systems
computer network security
encoding
Predictive Metrics
information technology
composability
pubcrawl
Resiliency
security
Internet of Things
biblio
Security and Trust Issues on Digital Supply Chain
Submitted by grigby1 on Thu, 03/12/2020 - 12:08pm
pubcrawl
Trusted Computing
trust problems
trust issues
Traceability
System performance
supply chains
supply chain security
supply chain management
security of data
security management
security
Scalability
Resiliency
resilience
Reliability
advanced information technologies
Pervasive Computing Security
Internet of Things
information technology
information science
Human behavior
History
exploratory investigation
digital supply chain system
digital supply chain management system
digital supply chain
composability
Cloud Computing
blockchain
Automated Response Actions
biblio
A Proposed Virtual Private Cloud-Based Disaster Recovery Strategy
Submitted by grigby1 on Mon, 03/02/2020 - 1:34pm
Organizations
virtual private cloud-based disaster recovery strategy
traditional disaster recovery
System recovery
security
Resiliency
resilience
Recovery Time Objective (RTO)
recovery time objective
Recovery Point Objective (RPO)
recovery point objective
pubcrawl
Planning
back-up procedures
information technology
information security
Google
disasters
Disaster Recovery (DR)
Disaster Cycle
Computational modeling
Cloud-Based Disaster Recovery
Cloud Computing
business continuity issues
business continuity
biblio
Incorporating Monitoring Points in SDN to Ensure Trusted Links Against Misbehaving Traffic Flows
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
Software-defined networking (SDN)
OpenFlow
process control
pubcrawl
real-time systems
Routing
Scalability
SDN controller
SDN design
software defined networking
software-defined networking
ongoing attacks
telecommunication traffic
traffic anomalies
traffic behavior monitoring
traffic information
traffic monitoring
traffic streams
Trust Routing
trusted communication links
Trusted Computing
Internet connectivity
behavior monitoring unit
communication links
composability
computer network security
computer networking
computer networks
control systems
data streams
information technology
internet
Anomaly Detection
Market research
misbehaving traffic flows
misconfigured devices
Monitoring
monitoring points
network devices
network links
Network Monitoring
network traffic
biblio
Cybersecurity concerns on real time monitoring in electrical transmission and distribution systems (SMART GRIDS)
Submitted by aekwall on Mon, 02/17/2020 - 2:17pm
Smart Grids
virtual world
uniform legal system
transmission and distribution systems
national borders
Information Technology Introduction
energy delivery system
electrical transmission
distribution systems
cybersecurity concerns
Communications
common perception
privacy issues
information technology
power system security
security
power engineering computing
smart grid security
smart power grids
standards
Metrics
privacy
pubcrawl
Resiliency
Software
data privacy
Scalability
Computer crime
security of data
biblio
An Improved Video Steganography: Using Random Key-Dependent
Submitted by grigby1 on Mon, 02/10/2020 - 11:42am
privacy
video signal processing
video recording
video frames RGB channels
steganography performance criteria
steganography detection
Steganography
security
secret text
secret data hiding
Robustness
Random Key -Dependent Data
quality assessment
pubcrawl
composability
nonsecret digital carrier
Metrics
Media
information technology
information insurance
improved video steganography
Image edge detection
image colour analysis
Hiding information and Key-Dependent Data Technique
Exact Matching Algorithm
current communications channels insurance advancements
cover media
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »