Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
codes
biblio
An Information Theoretic Approach to Assist in Identifying Counterfeit Consumer Goods
Submitted by grigby1 on Mon, 01/10/2022 - 12:16pm
pubcrawl
Township Community
tools
Spaza-Shop
Scalability
RSA private-key decryption
Resiliency
resilience
QR code
public-key encryption
Public key
android
Prediction algorithms
Metrics
information sharing
Human behavior
encryption
Databases
codes
Cloud Storage Database
android encryption
biblio
Performance Analysis of Zero-Trust Multi-Cloud
Submitted by grigby1 on Tue, 12/21/2021 - 3:20pm
Performance analysis
zero trust networking
zero trust
testing
sidecar proxy
Service Mesh
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Acoustic Fingerprints
multi cloud
Kubernetes
Istio
Human Factors
Human behavior
Cryptography
Conferences
collaboration
codes
Cloud Computing
biblio
Adopting Trusted Types in ProductionWeb Frameworks to Prevent DOM-Based Cross-Site Scripting: A Case Study
Submitted by grigby1 on Mon, 12/20/2021 - 11:28am
Compositionality
web security
trusted types
security
Resiliency
resilience
pubcrawl
Proposals
HTML
cross-site scripting
Costs
Cross Site Scripting
composability
codes
Application Programming Interface (API)
application program interfaces
Application program interface
APIs
API
Scalability
Human behavior
biblio
Identifying Vulnerable IoT Applications Using Deep Learning
Submitted by grigby1 on Mon, 11/29/2021 - 2:29pm
codes
composability
deep learning
Metrics
Predictive models
pubcrawl
Software algorithms
taint analysis
tools
Training
Transforms
biblio
Highly Secured all Optical DIM Codes using AND Gate
Submitted by grigby1 on Tue, 02/23/2021 - 2:37pm
optical gating
highly secured all optical DIM codes
MAI reduction
multiple access interference
multiple access interference (MAI)
optical amplifiers
optical code division multiple access
Optical Code Division Multiple Access system (OCDMA)
optical communication equipment
optical diagonal identity matrices codes
Diagonal Identity Matrix (DIM)
optical logic
optical systems
regularly expanding information traffic
semiconductor optical amplifier
Semiconductor optical amplifiers
spectral amplitude coding-OCDMA systems
zero cross-correlation
Zero Cross-Correlation (ZCC)
network coding
security
pubcrawl
Metrics
resilience
Resiliency
composability
telecommunication traffic
Q-factor
Logic gates
Optical fibers
codes
Optical fiber networks
interference suppression
Integrated optics
AND Gate
code division multiple access
correlation methods
biblio
GCSA Codes with Noise Alignment for Secure Coded Multi-Party Batch Matrix Multiplication
Submitted by grigby1 on Tue, 12/15/2020 - 1:27pm
Metrics
telecommunication network topology
synchronisation
SMBMM
security
secure multiparty batch matrix multiplication problem
secure interserver communication
Resiliency
resilience
pubcrawl
polynomials
polynomial sharing
pairwise products
noise alignment
network servers
batch processing
matrix multiplication
master gains no additional information
GCSA-NA
GCSA codes
flexible interserver network topology
Cryptography
Cross Subspace Alignment codes
computer network security
computational complexity
Compositionality
colluding servers
coding theory
codes
biblio
Secure Determinant Codes: A Class of Secure Exact-Repair Regenerating Codes
Submitted by grigby1 on Fri, 09/18/2020 - 1:47pm
Upper bound
secure exact-repair regenerating codes
secure determinant codes
repair bandwidth
per-node storage
information-theoretic secrecy
Distributed storage system
codes
Manganese
linear codes
coding theory
information theory
security of data
Compositionality
Bandwidth
Metrics
Redundancy
maintenance engineering
storage management
Cryptography
Resiliency
resilience
pubcrawl
security
biblio
Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking
Submitted by grigby1 on Fri, 07/10/2020 - 1:07pm
Human Factors
Web sites
Web browser fingerprinting
Unsupervised Learning
static analysis
Resiliency
resilience
pubcrawl
Metrics
malicious JavaScript codes
Java
internet
in-browser cryptojacking
code complexities
Human behavior
economic analysis
dynamic analysis
dropzone cryptojacking server
cryptojacking scripts
cryptojacking attackers
cryptojacking
Cryptography
computer network security
codes
code-based categorization
biblio
Security for Minimum Storage Regenerating Codes and Locally Repairable Codes
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
MR codes
telecommunication security
security
secure storage codes
Secure storage
Resiliency
resilience
repair efficient distributed storage systems
pubcrawl
precoding
passive eavesdropper
outer coset code
MSR codes
Bandwidth
minimum storage regenerating codes
Metrics
maximally recoverable codes
maintenance engineering
LRC codes
locally repairable codes
inner storage code
Cryptography
Compositionality
coding theory
codes
biblio
Polar codes for arbitrary classical-quantum channels and arbitrary cq-MACs
Submitted by grigby1 on Tue, 01/16/2018 - 6:36pm
Human Factors
Scalability
Resiliency
Reliability
Receivers
Random variables
quantum successive cancellation decoder
pubcrawl
probability of error
polarization theorems
polar codes
Metrics
arbitrary Abelian group operation
Homomorphic encryption
error statistics
encoding
Electronic mail
deterministic homomorphism channels
Decoding
codes
Arikan-style transformation
arbitrary cq-MAC
arbitrary classical-quantum multiple access channels
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
next ›
last »