Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software algorithms
biblio
The Internet-of-Battlefield-Things (IoBT)-Based Enemy Localization Using Soldiers Location and Gunshot Direction
Submitted by aekwall on Wed, 08/11/2021 - 2:52pm
defence Internet of Things (IoT)
IoBT Security
Software algorithms
smart wearables
Prototypes
Prediction algorithms
Magnetometers
gunshot direction
enemy localization algorithm
sensors
Cyber–physical systems (CPS)
Internet of Battlefield Things (IoBT)
Resiliency
Scalability
pubcrawl
Clustering algorithms
Human Factors
Hardware
biblio
Analysis of Subject Recognition Algorithms based on Neural Networks
Submitted by grigby1 on Tue, 05/25/2021 - 3:25pm
pubcrawl
Training
Text recognition
Task Analysis
Software algorithms
Software
simplest perceptron
Scalability
Resilient
resilience
artificial neural network
Pattern recognition
Metrics
information science
Human Factors
Human behavior
cryptology
composability
collaboration
Artificial Neural Networks
biblio
Efficient Implementation of HashSieve Algorithm for Lattice-Based Cryptography
Submitted by grigby1 on Tue, 05/25/2021 - 3:24pm
Prediction algorithms
SVP
standards
software libraries
Software algorithms
Software
sieving algorithms
Scalability
Resilient
resilience
pubcrawl
collaboration
modular software
Metrics
Lattices
lattice-based cryptography
Human Factors
Human behavior
HashSieve
cryptology
Cryptography
composability
biblio
Network Attack Surface Simplification for Red and Blue Teams
Submitted by aekwall on Thu, 05/13/2021 - 11:34am
Organizations
Resiliency
pubcrawl
Metrics
Shape
tools
Clustering algorithms
Complexity theory
Scalability
Software algorithms
Surface treatment
attack surface
cluster analysis
Network Attack Surface
biblio
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach
Submitted by aekwall on Tue, 04/27/2021 - 1:11pm
security
Software
Bayes methods
cyber-physical systems
Resiliency
pubcrawl
vulnerabilities
Topology
Scalability
Software algorithms
Systematics
security risk assessment
attack graphs
belief networks
Bayesian networks
Probabilistic Graphical Models
biblio
Hardware Design of Polynomial Multiplication for Byte-Level Ring-LWE Based Cryptosystem
Submitted by aekwall on Mon, 03/15/2021 - 12:10pm
NIST PQC Standardization Process
BRAMs
byte-level modulus
byte-level ring-LWE based cryptosystem
computational time-consuming block
DSPs
high-level synthesis based hardware design methodology
ideal lattice
LAC
multiplication core
high level synthesis
polynomial multiplication
ring learning with error problem
ring LWE
time 4.3985 ns
time 5.052 ns
time 5.133 ns
Vivado HLS compiler
Xilinx Artix-7 family FPGA
NIST
Scalability
lattice-based cryptography
Cryptography
Hardware
Table lookup
learning (artificial intelligence)
Resiliency
pubcrawl
Metrics
field programmable gate arrays
post quantum cryptography
timing
polynomials
Software algorithms
Compositionality
program compilers
compiler security
logic design
biblio
Hands-on Undergraduate Labs on Anonymity Cryptographic Algorithms
Submitted by grigby1 on Thu, 01/28/2021 - 2:02pm
Protocols
Wireshark dissector
undergraduate security course
Tor
Software algorithms
security
Resiliency
resilience
Relays
pubcrawl
anonymity
project-based learning
problem-based learning
onion routing
Metrics
Libraries
Human behavior
education
Cryptography
composability
biblio
Ensuring Cybersecurity of Data Transmission in Limited Energy Consumption Networks
Submitted by grigby1 on Thu, 01/28/2021 - 1:33pm
pubcrawl
wireless transmission
Temperature measurement
Software algorithms
Software
smart phones
Scalability
RSA
Resiliency
resilience
android encryption
Metrics
Human behavior
Energy Efficiency
encryption
Diffie-Hellman algorithm
Cybersecurity
computer security
Complexity theory
asymmetric encryption/decryption algorithm
biblio
Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography
Submitted by aekwall on Mon, 01/25/2021 - 12:58pm
hashing functions
Steganography
cloud data
security issue
asymmetric cryptography
Asymmetric Encryption
AES symmetric encryption
compressed data
data encryption phase
data validation phase
symmetric cryptography
information concealment technology
LSB algorithm
LZW algorithm
mixed encryption
RSA asymmetric encryption
SHA hashing algorithm
Steganographic
strong data security
data compression
encrypted data
encryption
hybrid encryption
cloud storage
Resiliency
Human behavior
pubcrawl
composability
Metrics
Cloud Computing
public key cryptography
security improvement
Image coding
information technology
cloud environment
Software algorithms
Image Processing
data storage
biblio
New Direction of Cryptography: A Review on Text-to-Image Encryption Algorithms Based on RGB Color Value
Submitted by aekwall on Mon, 01/25/2021 - 12:57pm
image colour analysis
text-to-image encryption algorithms
Text-to-Image Encryption
survey
RSA and AES
RGB Value
RGB color value
keeping data
global network
data encryption techniques
Comparison
Asymmetric Encryption
symmetric encryption algorithms
asymmetric encryption algorithms
sensitive data
Cryptography
Software algorithms
public key cryptography
Public key
Image color analysis
text analysis
Databases
Metrics
composability
pubcrawl
Human behavior
Resiliency
Receivers
encryption
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »