Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security mechanisms
biblio
TPM-supported key agreement protocols for increased autonomy in constellation of spacecrafts
Submitted by grigby1 on Mon, 11/13/2017 - 12:00pm
pubcrawl
TT&c
trusted platform modules
Trusted Platform Module
TPM-supported key agreement protocols
spacecrafts
Space vehicles
space missions
space communication links
security mechanisms
Resiliency
composability
Protocols
protocol iterations
payload links
opportunistic control center
Jamming
encryption
DH-HEMTs
Cryptographic Protocols
cryptographic keys
biblio
2entFOX: A framework for high survivable ransomwares detection
Submitted by grigby1 on Fri, 11/03/2017 - 11:27am
invasive software
security mechanisms
Security Awareness
Resiliency
ransomwares behaviour
ransomware detection
ransomware attacks
Ransomware
pubcrawl
Metrics
malwares
malware detection
Malware Analysis
malware
2entFOX
Human behavior
HSR
high survivable ransomwares detection
high survivable ransomware
feature extraction
Engines
Cryptography
computer architecture
composability
belief networks
behavioral detection
Bayesian belief network
Bayes methods
biblio
A high speed implementation counter mode cryptography using hardware parallelism
Submitted by grigby1 on Thu, 04/20/2017 - 12:41pm
parallel computing
hardware parallelism
Heracles toolkit
high speed implementation counter mode cryptography
network-on-chip
network on chip
Network on Chip(NoC)
network on chip security
NoC
graphics processing units
pubcrawl
Resiliency
Scalability
secure data transmission
security mechanisms
Software algorithms
unsecured networks
DES
Big Data
composability
Counter Mode Cryptography (CTR)
CPU
Cryptography
CTR
data encryption standard core
Data Encryption Standard (DES)
Algorithm design and analysis
encryption
field programmable gate arrays
FPGA
FPGA board
gpu
Grafic Process Unite(GPU)
graphics processing unit
biblio
Examining the Effect of Wireless Sensor Network Synchronization on Base Station Anonymity
Submitted by BrandonB on Mon, 05/04/2015 - 2:11pm
synchronisation
WSN topology
wireless sensor networks
wireless sensor network synchronization
Wireless Sensor Network
Wireless communication
traffic analysis techniques
TPSN
timing-synch protocol for sensor networks
telecommunication traffic
telecommunication security
telecommunication network topology
Synchronization
anonymity
sensors
security mechanisms
reference broadcast synchronization
Receivers
RBS
Protocols
network traffic flow
location privacy
evidence theory analysis
data sources
BS anonymity improvement
base station anonymity
biblio
Performance evaluation of security mechanisms in RAOLSR protocol for Wireless Mesh Networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:42am
radio aware optimized link state routing
WMN
wireless mesh networks
topology control
telecommunication network topology
telecommunication control
security mechanisms
security
Routing protocols
Routing Protocol
Routing
Cryptography
network simulator-3 simulations
IEEE 802.11 Standards
identity based encryption
IBE-RAOLSR protocols
IBE
hello messages
elliptic curve digital signature algorithm
ECDSA-RAOLSR protocols
digital signatures
delays
biblio
Analysis of Field Data on Web Security Vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 3:03pm
security of data
XSS
Web security vulnerabilities
Web application vulnerabilities
vulnerability scanners
static code analyzers
SQL injection
SQL
source code (software)
source code
software faults
software fault tolerance
Software
security patches
attack injectors
security mechanisms
security
review and evaluation
realistic vulnerability
languages
Java
Intrusion Detection Systems
Internet applications
internet
field data analysis
code inspectors
Blogs
Awards activities
« first
‹ previous
1
2
3
4