Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Resists
biblio
A Three-dimension Resilience State Space-based Approach to Resilience Assessment of CBTC system
Submitted by grigby1 on Fri, 08/26/2022 - 1:21pm
pubcrawl
Human behavior
resilience
Resiliency
Scalability
malware
control systems
fault tolerance
simulation
Three-dimensional displays
Human Factors
Resists
Control Theory
State-space methods
biblio
A Secure Routing Algorithm Based on Trust Value for Micro-nano Satellite Network
Submitted by grigby1 on Wed, 08/10/2022 - 2:41pm
Satellites
trust value
diversity reception
simulation
energy consumption
Packet loss
Routing
composability
Scalability
Resiliency
resilience
pubcrawl
Resists
Secure Routing
micro-nano satellite
Trust Routing
biblio
Filtration method of DDoS attacks based on time-frequency analysis
Submitted by aekwall on Fri, 07/01/2022 - 9:46am
Chained Attacks
Conferences
DDoS Attacks
denial-of-service attack
Filtering
filtering algorithms
Filtering method
Fourier transform
pubcrawl
Resiliency
Resists
Scalability
Throughput
Time-frequency Analysis
wavelet transform
Wigner-Ville method
biblio
New McEliece Cryptosystem Based on Polar-LDPC Concatenated Codes as a Post-quantum Cryptography
Submitted by grigby1 on Fri, 07/01/2022 - 8:29am
coding theory
Post-quantum resilience
McEliece Cryptosystem
LDPC codes
Asymmetric Encryption
codes
Resiliency
Resists
polar codes
security
parity check codes
Decoding
Metrics
Quantum mechanics
quantum computing
Computers
resilience
pubcrawl
biblio
Low Noise Homomorphic Encryption Scheme Supporting Multi-Bit Encryption
Submitted by grigby1 on Thu, 06/09/2022 - 2:42pm
noise reduction
Multi-bit encryption
ciphertext noise expansion rate
chosen plaintext attack
Human Factors
fully homomorphic encryption
Computational efficiency
Resists
Homomorphic encryption
pubcrawl
Data processing
Metrics
network security
computer security
privacy
Scalability
Resiliency
resilience
biblio
Research on vehicle network intrusion detection technology based on dynamic data set
Submitted by grigby1 on Thu, 06/09/2022 - 9:12am
network security
internet of vehicles security
data set
cyber physical systems
Ethernet
Resists
Human Factors
Intelligent vehicles
network intrusion detection
Metrics
feature extraction
cyber security
Internet of Vehicles
Resiliency
resilience
Human behavior
pubcrawl
Intrusion Detection
machine learning algorithms
biblio
Lightweight Grouping-Proof for Post-Quantum RFID Security
Submitted by grigby1 on Tue, 05/10/2022 - 12:54pm
smart cities
Passive RFID tags
LPN
grouping-proof
ubiquitous computing
Lightweight
Resists
Human Factors
Technological innovation
pubcrawl
Robustness
quantum computing
Protocols
Scalability
performance evaluation
Resiliency
resilience
Metrics
biblio
Research on Image Encryption Technology Based on Hyperchaotic System and DNA Encoding
Submitted by grigby1 on Fri, 05/06/2022 - 10:33am
Performance analysis
six-dimensional hyperchaotic system
logistic mapping
DNA coding
DNA cryptography
Resists
image encryption
DNA
Image coding
encryption
resilience
Metrics
encoding
privacy
Conferences
Resiliency
Human behavior
pubcrawl
biblio
Quantum attack-resistant signature scheme from lattice cryptography for WFH
Submitted by grigby1 on Tue, 04/26/2022 - 2:50pm
Cryptography
digital signatures
gaussian distribution
identity-based signature
lattice
Lattices
pubcrawl
Quantum attack-resistant
quantum computing
reject sampling
resilience
Resiliency
Resistance
Resists
Scalability
biblio
A Survey on Security and Privacy Threats to Federated Learning
Submitted by grigby1 on Mon, 04/18/2022 - 2:36pm
policy-based governance
security weaknesses
security threat
Resists
Resiliency
resilience
pubcrawl
Protocols
Privacy-preserving
privacy
Collaborative Work
poisoning attacks
inference attacks
IEEE standards
Human behavior
generative adversarial networks
GAN attacks.
federated learning
Computational modeling
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »