Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptographic techniques
biblio
V-CRYPT: A Secure Visual Cryptography System
Submitted by aekwall on Fri, 04/01/2022 - 2:07pm
Predictive Metrics
Scientific Computing Security
voting
visual cryptography
phishing attack
Hacker
election
cryptographic techniques
scientific computing
information management
Image Processing
Compositionality
Complexity theory
Resiliency
pubcrawl
encryption
data privacy
visualization
security
biblio
Cloud's Transformative Involvement in Managing BIG-DATA ANALYTICS For Securing Data in Transit, Storage And Use: A Study
Submitted by grigby1 on Tue, 04/27/2021 - 2:48pm
Big Data
big data security in the cloud
cloud
Cloud Computing
Cloud in Big Data
Computational modeling
cryptographic techniques
Data Security
Distributed databases
encryption
pubcrawl
Receivers
security
Software
biblio
Machine Learning Based Physical-Layer Intrusion Detection and Location for the Smart Grid
Submitted by grigby1 on Fri, 11/20/2020 - 2:05pm
security of data
Power cables
power engineering computing
power system security
privacy
pubcrawl
radio networks
resilience
Resiliency
Scalability
policy-based governance
smart grid communication data
smart grid consumer privacy
smart grid data security
Smart Grids
smart power grids
stand-alone solution
Task Analysis
upper layer techniques
Intrusion Detection
carrier transmission on power lines
collaboration
communication purposes
composability
continuous bidirectional information exchange
cryptographic techniques
Human behavior
ideal intruder detection rates
Impedance
active intruder
learning (artificial intelligence)
machine learning
Metrics
modems
network stack
PHY design
physical layer methods
physical-layer intrusion detection
biblio
TrustSAS: A Trustworthy Spectrum Access System for the 3.5 GHz CBRS Band
Submitted by aekwall on Mon, 04/13/2020 - 10:21am
spectrum databases
Federal Communications Commission
frequency 150.0 MHz
frequency 3.5 GHz
gallium arsenide
seamless spectrum
secondary users
sensitive operational information
Spectrum access system
spectrum availability
FCC regulatory design requirements
spectrum demand
spectrum usage
SU privacy issues
Synthetic aperture sonar
TrustSAS
trustworthy framework
trustworthy spectrum access system
Trustworthy Systems
blockchain technology
data privacy
telecommunication security
Resiliency
pubcrawl
composability
privacy
Peer-to-peer computing
blockchain
Databases
Cryptography
radio spectrum management
cyber physical systems
broadband networks
CBRS band
citizens broadband radio service
cryptographic techniques
dynamic spectrum access system
FCC
biblio
Openstack: Launch a Secure User Virtual Machine Image into a Trust Public Cloud IaaS Environment
Submitted by grigby1 on Mon, 03/09/2020 - 1:27pm
tpm
policy-based governance
pubcrawl
Resiliency
Scalability
secure launch user VMI
secure user virtual machine image
security
security policy
Software
openstack
trust cloud environment
trust public cloud IaaS environment
Trusted Computing
user VMI requirements
virtual machine security
virtual machines
Virtual machining
VMI
Cryptography
cloud computing architecture
Cloud Management Platforms
cloud-delivered model
CMP
Computational modeling
computer architecture
confidentiality
cryptographic techniques
Cloud Computing
cryptology
enhanced TPM remote attestation
Human behavior
IaaS
IaaS classical processes
infrastructure-as-a-service
Launch
Metrics
biblio
Search for secure data transmission in MANET: A review
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
Peer-to-peer computing
versatile node
transmission range
security mechanisms
secure data transmission
Routing protocols
routimg protocols
Resiliency
resilience
pubcrawl
Protocols
privacy
portable nodes
Compositionality
multihop network
mobile nodes
mobile ad-hoc network
mobile ad hoc networks
Metrics
MANET
intermediate node
independent ambulant nodes
highly dynamic network
Cryptography
cryptographic techniques
cryptographic technique
biblio
A Practical One-Time File Encryption Protocol for IoT Devices
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
security issues
OTFEP
privacy issues
Protocols
pubcrawl
Resiliency
Scalability
scalable one-time file encryption protocol
secure key distribution mechanism
node scalability
security protocol
Servers
small file
specialized security requirements
stream file
system manager
third-party auditors
file encryption
cryptographic techniques
data privacy
Data protection
database
database management systems
Electronic mail
Elliptic curve cryptography
encryption
Cryptographic Protocols
file organisation
file protection
Internet of Things
IoT
IoT devices
IoT environment
Metrics
biblio
Efficient search on encrypted data using bloom filter
Submitted by BrandonB on Tue, 05/05/2015 - 11:44am
data theft
storage cost reduction
Servers
sentence search
search operations
information retrieval
Information filters
Indexes
filtering algorithms
Encrypted Search
efficient encrypted data search
document handling
document decryption
approximate search
data structures
data misuse
data loss
Cryptography
cryptographic techniques
cost reduction
computer science
cloud services
Cloud Computing
case sensitive search
Bloom filter
Approximate Search and Bloom Filter
biblio
LUT based secure cloud computing #x2014; An implementation using FPGAs
Submitted by BrandonB on Tue, 05/05/2015 - 9:24am
Games
Table lookup
suitable hardware platform
security requirements
security of data
secure cloud computing scheme
program security
pattern clustering
LUT based secure cloud computing
look-up table
k-means clustering algorithm
Big Data
FPGA
Formalization
field programmable gate arrays
encryption
data sharing
data security problem
cryptographic techniques
Cloud Computing
big data processing