Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data processing
biblio
Analysis of Attack Effectiveness Evaluation of AD hoc Networks based on Rough Set Theory
Submitted by grigby1 on Fri, 08/26/2022 - 3:06pm
security
pubcrawl
Human behavior
Human Factors
Resiliency
Indexes
Scalability
Ad hoc networks
Data processing
computational intelligence
Rough sets
Control Theory
effectiveness evaluation
mobile ad hoc networks
rough set theory
biblio
Low Noise Homomorphic Encryption Scheme Supporting Multi-Bit Encryption
Submitted by grigby1 on Thu, 06/09/2022 - 2:42pm
noise reduction
Multi-bit encryption
ciphertext noise expansion rate
chosen plaintext attack
Human Factors
fully homomorphic encryption
Computational efficiency
Resists
Homomorphic encryption
pubcrawl
Data processing
Metrics
network security
computer security
privacy
Scalability
Resiliency
resilience
biblio
Leveraging Edge Computing and Differential Privacy to Securely Enable Industrial Cloud Collaboration Along the Value Chain
Submitted by grigby1 on Wed, 06/08/2022 - 10:21am
collaboration
pubcrawl
policy-based governance
resilience
Resiliency
Conferences
composability
real-time systems
edge computing
Stability analysis
intellectual property
Data processing
differential privacy
anonymization
intellectual property security
chatter analysis
biblio
Security Analysis of Private Intellectual Property
Submitted by grigby1 on Wed, 06/08/2022 - 10:18am
internet
Support vector machines
Resiliency
resilience
real-time systems
pubcrawl
private intellectual
policy-based governance
patents
ip protection
intellectual property security
Intellectual Property Rights (IPR)
Intellectual Property Protection
intellectual property
infringer
Economics
Data processing
composability
biblio
Power Grid Data Confirmation Model Based on Behavior Characteristics
Submitted by aekwall on Fri, 05/06/2022 - 12:51pm
behavior control
Cloud Computing
Compositionality
Computational modeling
Data audit
data encryption
Data processing
Database systems
encryption audits
Java
power grids
Predictive Metrics
privacy protection
pubcrawl
Resiliency
Structured Query Language
biblio
Modeling the Processing of Non-Poissonian IIoT Traffic by Intra-Chip Routers of Network Data Processing Devices
Submitted by aekwall on Mon, 03/14/2022 - 1:43pm
Predictive Metrics
Router Systems Security
traffic modeling
switching element
switch fabric
sensor systems and applications
parallel switching
Internet of Things
iiot
6G
NoC
Data models
Data processing
Fabrics
Resiliency
pubcrawl
Switches
Streaming media
5G
Routing
IoT
biblio
Large Scale Multimodal Data Processing Middleware for Intelligent Transport Systems
Submitted by grigby1 on Fri, 02/25/2022 - 1:32pm
security
pubcrawl
policy-based governance
collaboration
Topology
composability
Ontologies
Geometry
Scalability
middleware security
Data processing
Technological innovation
biblio
Detection of DDoS Based on Gray Level Co-Occurrence Matrix Theory and Deep Learning
Submitted by grigby1 on Tue, 09/07/2021 - 2:00pm
feature extraction
statistical analysis
Resiliency
resilience
raw data flow
pubcrawl
Metrics
Human behavior
Gray Level Co-occurrence Matrix
Classification algorithms
Distributed databases
denial-of-service attack
deep learning
DDoS attack detection
Data processing
convolutional neural network
composability
biblio
A Convolutional Encoder Network for Intrusion Detection in Controller Area Networks
Submitted by aekwall on Tue, 09/07/2021 - 11:11am
false negative rate
Training
security
Resiliency
pubcrawl
network intrusion detection
Internet of Things
IDS
feature extraction
Network Security Architecture
Data processing
Data mining
cyber-physical systems
controller area network security
controller area network
Computational modeling
CNN
biblio
Auditable secure network overlays for multi-domain distributed applications
Submitted by grigby1 on Tue, 02/23/2021 - 2:23pm
Metrics
Virtual private networks
software stack
Resiliency
resilience
Public key
pubcrawl
Prototypes
overlay networks
overlay network
organisational boundaries
operational infrastructure
network accountability
multidomain overlay network
multidomain distributed applications
actionable contracts
marketplace
internet
digital data market place infrastructure
data sharing
Data processing
Data collection
Cryptography
contracts
computer network security
composability
communication fabric
auditing
auditable secure network overlays
actors
« first
‹ previous
1
2
3
4
5
next ›
last »