Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
logistic map
biblio
Node Protection using Hiding Identity for IPv6 Based Network
Submitted by grigby1 on Fri, 02/24/2023 - 4:31pm
Policy Based Governance
SHA2
OPNET
IP spoofing
logistic map
RSA
Steganography
Power demand
IPv6
traffic control
Receivers
collaboration
network security
Memory management
composability
Computational modeling
Resiliency
resilience
Metrics
pubcrawl
security
biblio
A Novel Laplacian of Gaussian (LoG) and Chaotic Encryption Based Image Steganography Technique
Submitted by grigby1 on Thu, 10/20/2022 - 3:22pm
encryption
Logistics
pubcrawl
Metrics
privacy
composability
Payloads
Image edge detection
Biomedical imaging
Steganography
logistic map
Image Steganography
Edge Detection Technique
Laplacian of Gaussian (LoG)
random sequence
steganography detection
biblio
Eligibility Analysis of Different Chaotic Systems Derived from Logistic Map for Design of Cryptographic Components
Submitted by grigby1 on Tue, 07/12/2022 - 2:24pm
computer science
substitution box
policy governance
logistic map
cryptology
Hash functions
chaos
Compositionality
Proposals
Metrics
Cryptography
composability
Entropy
Generators
Resiliency
resilience
pubcrawl
collaboration
encryption
biblio
An Implicit Approach for Visual Data: Compression Encryption via Singular Value Decomposition, Multiple Chaos and Beta Function
Submitted by grigby1 on Mon, 03/14/2022 - 11:23am
Metrics
singular value decomposition
logistic map
Compression
Beta Function
Arnold cat map
digital images
Image coding
visualization
Reliability
encryption
Policy Based Governance
Safe Coding
Cats
chaotic communication
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
The Design of S-box Based on Combined Chaotic Map
Submitted by aekwall on Mon, 01/18/2021 - 10:23am
S-box
substitution box
S-box construction method
one-dimension chaotic map
nonlinear component
logistic map
lightweight block cipher
combined chaotic map
sine map
Scalability
cryptographic algorithm
chaotic cryptography
chaos
probability
Metrics
pubcrawl
Resiliency
Cryptography
biblio
Secured Transmission of Data Using Chaos in Wcdma Network
Submitted by aekwall on Tue, 09/08/2020 - 9:05am
multipath channels
additive white gaussian noise channel
AWGN
AWGN and Rayleigh multipath fading channel
binary sequence
binary sequences
chaotic signal transmission
code division multiple access
gold codes
logistic map
Multiaccess communication
BER
PN grouping
QPSK
QPSK modulation techniques
Rayleigh multipath fading channel
spreading code
spreading sequence
W-CDMA framework
Walsh codes
WCDMA
chaotic communication
telecommunication security
Resiliency
pubcrawl
composability
Metrics
channel coding
error statistics
SNR
Downlink
security of data
AWGN channels
network coding
Rayleigh channels
Phase shift keying
data transmission security
Binary codes
spread spectrum communication
fading channels
modulation coding
biblio
Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
pseudo-random number generator (PRNG)
discrete-time chaotic maps
dynamics degradation
fixed point arithmetic
fixed-point arithmetic
floating point arithmetic
floating-point arithmetic
logistic map
Orbits
digital computer
pseudorandom number generators
Quantization (signal)
random number generation
randomness
SMN
state-mapping network
tent map
black box encryption
encryption
complex network
telecommunication security
Generators
pubcrawl
composability
Metrics
Resiliency
resilience
Cryptography
chaos
Degradation
chaotic communication
Logistics
black box
chaotic dynamics
chaotic map
communication securiy
biblio
A Novel Approach of Image Encryption Using Chaos and Dynamic DNA Sequence
Submitted by aekwall on Mon, 06/22/2020 - 10:28am
Human behavior
two dimension Sine-Henon alteration map
two dimension logistic map
reversible DNA operations
Resiliency
random processes
pubcrawl
pseudorandom sequences
privacy
Predictive Metrics
plain image pixel
Logistics
logistic map
image encryption scheme
Image coding
Cryptography
Histograms
Heuristic algorithms
encryption of image
encryption
encoding
dynamic DNA sequence
DNA sequence
DNA operations cipher image
DNA cryptography
DNA converted pixel
DNA
distorted image
Different types of attacks and Statistical Analysis
biblio
Hardware Implementation of Dynamic Key Value Based Stream Cipher Using Chaotic Logistic Map
Submitted by grigby1 on Tue, 10/08/2019 - 3:44pm
Random sequences
NIST statistical
nonrecursive key
private key cryptography
PRNG
pseudorandom number generation
pseudorandom sequence generation
pubcrawl
public key cryptography
random key generation
random number generation
Metrics
randomness tests
resilience
Resiliency
Scalability
stream cipher
symmetric key chaos based cryptography
Thermal analysis
Verilog HDL
X-power
Xilinx device
FPGA device
binary sequence
binary sequences
chaos
Chaos based cryptography
chaotic logistic map
Ciphers
dynamic key value based stream cipher
embedded systems
field programmable gate arrays
Field programmable gated array
asymmetric key chaos based cryptography
frequency 62.2 MHz
Hardware
Hardware Security
hardware-based embedded system
Human behavior
key scheduling
key stream
logistic map
Logistics
biblio
Reversible Chaotic Encryption Techniques For Images
Submitted by grigby1 on Wed, 12/27/2017 - 12:09pm
Image Processing
UACI
tent map
Signal processing algorithms
signal processing
reversible chaotic encryption technique
Resiliency
pubcrawl
PSNR
pixel shuffling
NPCR
MSE
Metrics
Logistics
logistic map
Arnold cat map
image pixels
image encryption security
image encryption
encryption
Cryptography
composability
civilian systems
Chaotic techniques
Chaotic maps
chaotic cryptography
chaotic communication
Cats
Arnold's cat map
1
2
next ›
last »