Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Resists
biblio
An Anti-Collusion Fingerprinting based on CFF Code and RS Code
Submitted by aekwall on Tue, 10/12/2021 - 3:21pm
Fingerprint recognition
Reed-Solomon codes
Reed-Solomon code
leak traceability
digital fingerprinting
Data Security
concatenated coding
Collusion Attacks
CFF
Provenance
Organizations
encoding
composability
Human behavior
Resiliency
Metrics
pubcrawl
Distributed databases
Resists
biblio
A Malware Similarity Analysis Method Based on Network Control Structure Graph
Submitted by grigby1 on Tue, 09/21/2021 - 3:51pm
pubcrawl
Training
Strain
software engineering
Software algorithms
similarity analysis
Resists
Resiliency
resilience
control branch point
privacy
network control structure graph
Metrics
Malware Analysis
malware
Human behavior
graph theory
feature extraction
biblio
A Cyber Resilient Design for Control Systems
Submitted by grigby1 on Thu, 09/16/2021 - 1:11pm
multi-agent systems
Sensor Systems
sensors
Resists
Resilient Security Architectures
resilient control
Resiliency
resilience
pubcrawl
and Cyber Physical Systems
hierarchical analytics architecture
Distributed databases
cyber security
cyber resilience
cyber awareness
control systems
Anomaly Detection
biblio
Research and Development of QR Code Steganography Based on JSteg Algorithm in DCT Domain
Submitted by grigby1 on Tue, 08/31/2021 - 12:57pm
Data mining
discrete cosine transforms
Image coding
pubcrawl
QR codes
resilience
Resiliency
Resists
standards
Transform coding
Watermarking
biblio
Security Analysis and Improvement of Identity-based Key Management Scheme for Airborne Ad Hoc Networks
Submitted by aekwall on Tue, 08/17/2021 - 4:15pm
security
Resists
authentication
Scalability
pubcrawl
Metrics
Resiliency
Human behavior
Ad hoc networks
Airborne ad hoc networks
Forgery
forgery attack
identity-based
key management
Optics
Telecommunications
biblio
A Blockchain-based User Remote Autentication Scheme in IoT Systems Using Physical Unclonable Functions
Submitted by grigby1 on Tue, 08/03/2021 - 4:51pm
authentication
blockchain
composability
Internet of Things
Logic gates
Metrics
Microelectronics
Physical Unclonable Function
physical unclonable functions
pubcrawl
resilience
Resiliency
Resistance
Resists
security
biblio
Multi-Authority Attribute Based Encryption With Policy-hidden and Accountability
Submitted by grigby1 on Tue, 07/27/2021 - 12:25pm
attribute-based encryption
Collusion
Data mining
encryption
feature extraction
Human behavior
Multi-authority
policy-based governance
pubcrawl
Resists
Scalability
security
standards
Traceability
biblio
An Anti-Attack Trust Mechanism Based on Collaborative Spectrum Sensing for Underwater Acoustic Sensor Networks
Submitted by grigby1 on Thu, 07/08/2021 - 3:01pm
Scalability
XOR operation
Underwater Networks
underwater communication
Underwater acoustics
UAC
trust mechanism
simulation
sensors
security
CUA
Safety
Resists
Resiliency
resilience
pubcrawl
Metrics
faces
Cyber Physical System
biblio
A Trust-based Message Passing Algorithm against Persistent SSDF
Submitted by aekwall on Mon, 06/28/2021 - 12:31pm
cognitive radio
cooperative spectrum sensing
false trust
Libraries
malicious users
Mathematical model
message passing
policy-based governance
pubcrawl
radio transmitters
Reliability
Resiliency
Resists
Scalability
sensors
biblio
New Virus Infection Technology and Its Detection
Submitted by grigby1 on Thu, 03/04/2021 - 2:45pm
pubcrawl
Windows system
Windows Operating System Security
Windows operating system
Viruses (medical)
software engineering
security technology
security
Resists
Resiliency
resilience
composability
Microsoft Windows (operating systems)
Metrics
Instruments
Information age
file viruses
file virus infection
dynamic binary instrumentation
computer viruses
computer virus infection
computer virus detection
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »