Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Comparative Analysis
biblio
Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin Transactions
Submitted by aekwall on Mon, 02/08/2021 - 1:46pm
time 0.0164 s
pubcrawl
public key cryptography
public key cryptosystems
Resiliency
RSA key generation
Scalability
Signature Generation
signature verification
time 0.001 s
time 0.002 s
time 0.004 s
post-quantum digital Signature algorithms
time 0.0187 s
time 0.0778 s
time 0.1378 s
time 0.2012 s
time 13.494 s
time 16.29 s
time 17.474 s
time 2.0E-4 s
verification time
W-OTS key generation
cryptographic systems security
security
bitcoin transaction security
Bitcoin transactions
classical algorithms
Comparative Analysis
Computer crime
Computers
creating digital signatures
cryptocurrencies
cryptocurrency
Cryptographic Protocols
bitcoin
Cryptography
current day algorithms
digital signatures
ECDSA key generation
Elliptic curves
encryption
Hash-based Signature Schemes
hash-based signatures
MSS Key generation
Post-quantum cryptography
biblio
A Comparative Analysis of Deep Learning based Super-Resolution Techniques for Thermal Videos
Submitted by grigby1 on Mon, 01/11/2021 - 1:57pm
Thermal analysis
pedestrians
poor resolution
pubcrawl
resilience
Resiliency
Scalability
SRGAN
Super resolution
super resolution techniques
super-resolution algorithms
super-resolution techniques
pedestrian database
thermal cameras
thermal frames
Thermal Imaging
thermal video dataset
thermal videos
video frame resolution
video signal processing
video streaming
video streams
Videos
Imaging
benchmark thermal datasets
Comparative Analysis
Databases
deep learning
deep neural networks
deep video
expensive optical sensors
Healthcare
Image resolution
image sequences
auto-encoder
infrared imaging
law enforcement
learning (artificial intelligence)
machine learning
Metrics
neural nets
Neural networks
object detection
optical precision
OSU color
biblio
Efficiency Assessment of the Steganographic Coding Method with Indirect Integration of Critical Information
Submitted by grigby1 on Fri, 09/18/2020 - 1:47pm
image media image
digital video data platform
Discrete Cosine Transformation (DCT)
discrete cosine transformation matrix
discrete cosine transforms
efficiency assessment
embedded critical data
embedded data resistance
embedded digital data
encoding embedding
image container
image fragment
digital representation
Koch methods
Lakes
quantization coefficient
steganographic coding
steganographic coding method
steganographic embedding
structural elements
transformed image
weight coefficients
Zhao methods
Image reconstruction
security
pubcrawl
resilience
Resiliency
matrix algebra
Cryptography
Containers
Metrics
Compositionality
visualization
Image coding
Comparative Analysis
Steganography
distortion
coding theory
built-in containers
code structures
container.
critical information
data extraction
digital data container
digital platform
biblio
A Comparative Analysis of Static Code Analysis Tools That Check Java Code Adherence to Java Coding Standards
Submitted by grigby1 on Mon, 02/10/2020 - 11:34am
Java programming language
testing
style
static code analysis tool
static code analysis
static analysis
standards
software quality
software maintenance
software development
Resiliency
resilience
quality
pubcrawl
program diagnostics
JPL Coding Standards
Concurrency
Java Coding Standards Enforcing Tools
Java code analysis
Java code adherence
Java
International Java Coding Standards
Human behavior
exceptions
critical system
concurrency (computers)
composability
Comparative Analysis
Coding Standard Analyzers
analyzers
security
biblio
Comparative Analysis of Lightweight Block Ciphers in IoT-Enabled Smart Environment
Submitted by aekwall on Mon, 01/20/2020 - 11:58am
privacy
ultra-lightweight block ciphers
Software
smart computing environment
signal processing
security solutions
security in resource-constrained environment
Schedules
Scalability
resource-constrained environment
Resiliency
real-life things
rapid technological growth
pubcrawl
32-bit cipher
lightweight cryptography
lightweight cryptographic solutions
Lightweight Ciphers
lightweight block ciphers
IoT-enabled smart environment
Internet of Things
Hardware Implementation
encryption
Cryptography
Comparative Analysis
Ciphers
32-bit ultra-lightweight block cipher security model
biblio
Machine Learning Based Intrusion Detection System
Submitted by aekwall on Mon, 01/20/2020 - 11:55am
malicious activity
well-organized classification methodology
Training
Support vector machines
Support Vector Machine Naive Bayes
support vector machine
statistical methodologies
security of data
Resiliency
pubcrawl
Predictive Metrics
pattern classification
NSL- KDD knowledge discovery dataset
network traffic data
Naive Bayes
Market research
Bayes methods
machine learning based intrusion detection system
machine learning
learning (artificial intelligence)
Intrusion Detection Systems
Intrusion Detection
Informatics
false alarms
distrustful activity
detection rate
Data mining
Conferences
computer network security
composability
Comparative Analysis
biblio
A Comparative Analysis of Trust Models for Safety Applications in IoT-Enabled Vehicular Networks
Submitted by grigby1 on Mon, 08/05/2019 - 11:35am
reliable trusted information dissemination
end-to-end delays
entity-oriented trust models
event detection probabilities
false information dissemination
false positive rates
hybrid trust models
Intelligent Transportation Systems
IoT-enabled vehicular networks
network entities
quality-of-service related benchmarks
received information
data oriented trust models
safety applications
secure environment
secure trusted network
smart cities
steep-curve warnings
surrounding infrastructure
transportation technology
Trust management
Trust models
vehicular nodes
false trust
probability
Safety
Computational modeling
resilience
pubcrawl
Resiliency
Scalability
Data models
information dissemination
computer network security
network nodes
Internet-of-Things
Internet of Things
VANET
vehicular ad hoc networks
sensitive information
Comparative Analysis
policy-based governance
collaboration
Vehicular Ad-hoc Network
authentic trusted information dissemination
black ice
comfortable driving experience
compromised information dissemination
biblio
Behavior-Based Community Detection: Application to Host Assessment In Enterprise Information Networks
Submitted by grigby1 on Mon, 06/10/2019 - 1:58pm
Anomaly Detection
behavior modeling
community detection
Comparative Analysis
enterprise information network
entity embedding
graph theory
host assessment
Human behavior
Malware Analysis
Metrics
privacy
pubcrawl
Resiliency
biblio
A Comparative Analysis of Visualisation Techniques to Achieve Cyber Situational Awareness in the Military
Submitted by grigby1 on Thu, 03/28/2019 - 3:13pm
cyber situational awareness
visualisation techniques
Royal Military Academy
operational picture
military commanders
Information systems
CyHSA
CyCOP
Cyber Hybrid Situational Awareness
cyber defense situational awareness
cyber defence implications
cyber common operational picture
Belgium
3D visualization
3D Operational Picture
situational awareness
security
Data visualization
data visualisation
Security Metrics
Comparative Analysis
Three-dimensional displays
Servers
military communication
military computing
composability
Resiliency
Metrics
pubcrawl
resilience
tools
security of data
biblio
Remediating a Design Tool: Implications of Digitizing Sticky Notes
Submitted by grigby1 on Thu, 01/31/2019 - 12:14pm
Analogical Transfer
Analogies and Transference
Comparative Analysis
cross-device interaction
design tools
Human behavior
Human Factors
pubcrawl
remediation
sticky notes
1
2
next ›
last »