Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
file organisation
biblio
Blockchain and the Identity based Encryption Scheme for High Data Security
Submitted by grigby1 on Mon, 03/29/2021 - 1:24pm
file organisation
storage management
Scalability
Resiliency
resilience
pubcrawl
private document storage
message authentication
Identity management
identity based encryption management
identity based encryption
Human behavior
high data security
hash algorithms
fraud
authentication
document handling
Distributed databases
data storage
Data protection
data privacy
data integrity
Cryptography
Consensus algorithm
Consensus
blockchain technology
blockchain
authorization
authorisation
biblio
Image Classification using Convolution Neural Network Based Hash Encoding and Particle Swarm Optimization
Submitted by aekwall on Mon, 03/29/2021 - 11:08am
visualization
TRV
transfer values
marketing
inception model
Image analysis
high-performance image classifier models
hashing techniques
hash encoding
Intelligent vehicles
TV
hash algorithms
file organisation
sequential model
Compositionality
image retrieval
Classification algorithms
Predictive models
pubcrawl
convolution neural network
image classification
genetic algorithms
convolutional neural network
convolutional neural nets
Training
particle swarm optimization
particle swarm optimisation
deep learning
Resiliency
feature extraction
Data models
biblio
Research and Application of Improved APRIORI Algorithm Based on Hash Technology
Submitted by aekwall on Mon, 03/29/2021 - 11:07am
Resiliency
Data mining
pubcrawl
Improvement
Compositionality
file organisation
hash algorithms
Apriori algorithm
association rule mining algorithm
hash technology
biblio
Transparent Provable Data Possession Scheme for Cloud Storage
Submitted by aekwall on Mon, 03/22/2021 - 12:06pm
encryption
user convenience
transparent provable Data Possession scheme
transparent PDP
third-party auditor
security of data
security
pubcrawl
provable data possession
Probabilistic logic
metadata
Mathematical model
general cloud storage system model
file organisation
encryption audits
provable security
discrete logarithm problem
data security techniques
data privacy
data integrity
conventional PDP
cloud storage
cloud proof
Cloud Computing
auditing
audit
Compositionality
Predictive Metrics
Resiliency
biblio
Building Knowledge Bases for Timestamp Changes Detection Mechanisms in MFT Windows OS
Submitted by grigby1 on Thu, 03/04/2021 - 1:44pm
information security
Windows Operating System Security
timestamps
Resiliency
resilience
pubcrawl
operating system
Microsoft Windows (operating systems)
MFT Windows Os
MFT
Metrics
master file table
knowledge bases
knowledge based systems
Windows operating system
İNDEX\_ROOT
İNDEX\_ALLOCATION
forensic analysis
file timestamp change detection
file organisation
file operations
feature extraction
Digital Forensics
computer forensic science
composability
\$STANDARDİNFORMATION
\$FILE\_NAME
security
biblio
I/O Efficient Approximate Nearest Neighbour Search based on Learned Functions
Submitted by aekwall on Mon, 02/22/2021 - 12:46pm
data-sensitive hashing-based methods
multimedia database
learned index structure
learned hashing
learned functions
input-output programs
indexing
I/O efficiency
high dimensional space
function approximation
external storage scenarios
external memory
data-sensitive indexing
data privacy
approximate nearest neighbour search
ANNS
nearest neighbor search
search problems
file organisation
Predictive Metrics
Measurement
query processing
neural nets
pubcrawl
learning (artificial intelligence)
nearest neighbour methods
biblio
Design and Implementation of Azalea unikernel file IO offload
Submitted by grigby1 on Fri, 10/30/2020 - 11:18am
Libraries
unikernel transfers
unikernel
Telecommunications
storage management
software libraries
security
Scalability
pubcrawl
operating systems (computers)
operating systems
operating system kernels
Offloading
Linux
azalea unikernel file IO offload
Kernel
Io offload
input-output programs
i-o systems security
I-O Systems
File systems
file system
file servers
file server
file organisation
file IO result
file IO command
biblio
Achieving Secure and Effective Search Services in Cloud Computing
Submitted by aekwall on Mon, 09/28/2020 - 10:55am
cloud services
Computing Theory and Privacy
WMFS scheme
wildcard-based multikeyword fuzzy search scheme
wildcard
substring matching
secure fuzzy search schemes
search services
search patterns
keyword misspellings
fuzzy search
database indexing
file organisation
Dictionaries
user privacy
Cloud Computing
Indexes
fuzzy set theory
data structures
query processing
pubcrawl
Human behavior
Resiliency
searchable encryption
data privacy
encryption
encrypted data
Cryptography
Scalability
biblio
Analysis of GPGPU-Based Brute-Force and Dictionary Attack on SHA-1 Password Hash
Submitted by grigby1 on Fri, 09/04/2020 - 2:36pm
general-purpose computing on graphics processing unit
brute force attacks
word-list
SHA-1 password hash
SHA-1
secure hash algorithm
password hash
mask-attack
hashed password data
GPGPU-based cracking
GPGPU-based brute-force attack
Cryptography
dictionary attack
brute-force
authentication data
policy-based governance
Human Factors
pubcrawl
encrypted file
message authentication
file organisation
authorisation
biblio
File Similarity Determination Based on Function Call Graph
Submitted by grigby1 on Thu, 07/30/2020 - 1:06pm
Plagiarism
static analysis methods
space-time efficiency
similarity detection method
similarity detection
large-scale software systems
graph isomorphism
function features
function call graph
file similarity determination
decision strategies
control flow features
ip protection
file organisation
information retrieval
feature extraction
intellectual property
graph theory
Syntactics
Measurement
Metrics
program diagnostics
static analysis
composability
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
1
2
3
4
next ›
last »