Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mathematical analysis
biblio
A Research on the Selection of Cooperative Enterprises in School-Enterprise Joint Cryptography Laboratory
Submitted by grigby1 on Mon, 07/31/2023 - 12:27pm
Entropy
School enterprise joint laboratory
grey correlation analysis
cryptology
Comprehensive evaluation
Fuzzy Cryptography
entropy weight method
mathematical analysis
Reliability
pubcrawl
Cryptography
Scalability
Analytical models
Indexes
Correlation
Resiliency
resilience
Metrics
biblio
Modification and Performance Improvement of Paillier Homomorphic Cryptosystem
Submitted by grigby1 on Tue, 05/10/2022 - 11:55am
key generation
ubiquitous computing
Scalability
Resiliency
resilience
pubcrawl
paillier cryptosystem
Metrics
mathematical analysis
Big Data
information security
Human Factors
Homomorphic encryption
data privacy
Cryptography
Conferences
cloud computing security
big data security
biblio
Nash Equilibrium of Multiple, Non-Uniform Bitcoin Block Withholding Attackers
Submitted by grigby1 on Fri, 09/04/2020 - 2:59pm
bitcoin security
seemingly malicious behavior
nonuniform Bitcoin mining pools
nonuniform Bitcoin block withholding attackers
Nash equilibrium conditions
Nash Equilibrium
Miner's Dilemma
MATLAB
mathematical analysis
in-depth profit analysis
cryptocurrency miners
BWH attack
blockchain distributed databases
Bitcoin-like systems
Scalability
profitability
bitcoin
cryptocurrency
Distributed databases
game theory
Peer-to-peer computing
cryptocurrencies
Data mining
Human behavior
pubcrawl
Hardware
blockchain
biblio
Air Gapped Wallet Schemes and Private Key Leakage in Permissioned Blockchain Platforms
Submitted by grigby1 on Fri, 08/07/2020 - 2:37pm
permissioned blockchain
Markov
Markov model
Markov processes
mathematical analysis
Mathematical model
Media
Metrics
outline justification
malware
permissioned blockchain platforms
private key leakage
Private Key Storage
pubcrawl
resilience
Resiliency
Scalability
security
composability
Air Gapped Wallet
air gapped wallet schemes
Air gaps
Atmospheric modeling
attack surface
blockchain
blockchain security
Channel Exfiltration
Air Gapped Storage
cryptocurrencies
data privacy
Distributed databases
Electromagnetics
Human behavior
Human Factors
key extraction
biblio
Modeling and Analysis of CPS Availability Based on the Object-oriented Timed Petri Nets
Submitted by grigby1 on Fri, 04/24/2020 - 3:20pm
object-oriented
simulations
security-critical applications
Resiliency
resilience
Reliability
pubcrawl
Petri nets
Petri Net
object-oriented timed Petri net
object-oriented system
object-oriented methods
Availability analysis
object oriented security
Metrics
mathematical analysis method
mathematical analysis
cyber-physical systems
CPS modeling
CPS availability analysis
CPS architecture model
CPS
composability
biblio
Container Cluster Model Development for Legacy Applications Integration in Scientific Software System
Submitted by aekwall on Mon, 10/28/2019 - 9:38am
MD - SLAG – MELT
computing applications
container
container cluster model development
containerization systems
distributed computer simulation
high-efficiency computing
high-performance computing
intellectual processing
legacy applications integration
mathematical analysis
computer software
MD-SLAG-MELT system
modern scientific information systems
molecular dynamic Modeling
nonstandardized interfaces
programming languages
scientific software system
system MD-SLAG-MELT
ubiquitous computing
Scientific Computing Security
Load modeling
Big Data
computer architecture
Resiliency
pubcrawl
Computational modeling
database
Databases
Software systems
software maintenance
Containers
Servers
pattern clustering
business data processing
visualization
Predictive Metrics
scientific information systems
Compositionality
cluster
computer experiments results
computer simulation systems
biblio
Detection of Composite Insulators Inner Defects Based on Flash Thermography
Submitted by grigby1 on Tue, 02/27/2018 - 1:28pm
mathematical analysis
transmission line
thermal diffusion
Temperature measurement
Surface treatment
Surface contamination
Resiliency
resilience
pubcrawl
power transmission lines
Pollution measurement
Pollution
non-destructive testing
Metrics
mathematical analysis model
air defects
Insulators
infrared imaging
Human Factors
Human behavior
Heating systems
heat loss
heat diffusion
flash thermography
composite insulators
composite insulator inner defect detection
composite insulator
composability
Air gaps
biblio
On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis
Submitted by grigby1 on Wed, 03/08/2017 - 1:25pm
protocol-based clustering tag
telecommunication security
supply-chain management systems
supply chain management
Servers
Security analysis
security
RFID systems
RFID
radiofrequency identification
radio frequency identification
pubcrawl170112
Protocols
authentication
privacy
mathematical analysis
Intelligent systems
industrial environment
Indexes
healthcare monitoring and
delays
delay analysis
cryptography protocol
Cryptographic Protocols
cryptographic protocol
biblio
A Multi-token Authorization Strategy for Secure Mobile Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 12:22pm
multitoken authorization strategy
security
Secure Mobile Computing
secure mobile cloud computing
radio links
privacy
Organizations
omnipresent mobile-based clients
OAuth
security of data
Modified Identity Management System
mobile computing
Mobile communication
mobile cloud computing
mathematical modeling
mathematical analysis
malicious code
IdM
Computer hacking
trust
traffic interception
identity management systems
identity management system
Hacker
data privacy
credentials
computing models
vulnerable wireless communication links
cloud resources
cloud computing security
Cloud Computing
authorization architecture
authorization
authorisation
Access Control
Servers