Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hash
biblio
Effective of Obfuscated Android Malware Detection using Static Analysis
Submitted by grigby1 on Wed, 09/20/2023 - 9:51am
Metrics
system protection
static analysis
risk value
Resiliency
resilience
pubcrawl
privacy
operating systems
Android operating system
malware detection
Malware Analysis
malware
Human behavior
hash
Data Security
data privacy
Behavioral sciences
biblio
Ibn Omar Hash Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 12:54pm
Hash functions
SHA-512
MD5
Ibn Omar
SHA-256
passwords
Linguistics
hash algorithms
hash
information security
Force
Compositionality
Complexity theory
privacy
Resiliency
resilience
pubcrawl
biblio
Digital Signature with Message Security Process
Submitted by grigby1 on Thu, 06/29/2023 - 11:02am
encryption
pubcrawl
resilience
Resiliency
Scalability
authentication
digital signature
Reliability
Receivers
decryption
digital signatures
hash
RSA algorithm
electronic commerce
SHA
biblio
Confirmation of Mutual Synchronization of the TPMs Using Hash Functions
Submitted by grigby1 on Thu, 06/09/2022 - 1:37pm
Hash Function
tree parity machines
synchronization time
ping
learning rules
input neurons
Hebbian rule
Resiliency
delay
hash algorithms
hash
Hash functions
Cryptography
Network
Market research
Synchronization
graphics processing units
Compositionality
Task Analysis
Neural networks
delays
resilience
pubcrawl
encryption
biblio
PCHA: A Fast Packet Classification Algorithm For IPv6 Based On Hash And AVL Tree
Submitted by aekwall on Tue, 08/17/2021 - 3:04pm
policy-based governance
ipv6 security
Time complexity
packet classification
high performance
hash
Classification algorithms
AVL tree
IPv6
Logic gates
Throughput
composability
Resiliency
Metrics
pubcrawl
performance evaluation
Cloud Computing
security
biblio
Randomness Analyses of the Secure Hash Algorithms, SHA-1, SHA-2 and Modified SHA
Submitted by aekwall on Mon, 06/08/2020 - 10:33am
hash
hash algorithms
SHA-2 hash functions
security analysis scheme
secure hash algorithm
randomness analyses
randomness
output hash
odd ratio tests
modified SHA
Merkle Damgård structure
high performance computing testbed
hash output
Cryptography
generated hash
famous secure hash algorithms SHA-1
CUDA parallel computing platform
corresponding hash function
Bayesian tests
Bayesian
SHA-1
Compositionality
parallel processing
pubcrawl
Resiliency
biblio
A Hybrid Packet Classification Algorithm Based on Hash Table and Geometric Space Partition
Submitted by aekwall on Mon, 06/08/2020 - 10:33am
high-speed packet classification requirement
classification speed
complex network conditions
existing classification schemes
geometric space partition
hash
hash matching
hash table
HGSP algorithm
classification performance
huge packets
hybrid packet classification algorithm
integrated space-ground network
ISGN
packet classification
tradition network
traditional Hicuts algorithm
hash algorithms
Communication networks
Memory management
security
Classification algorithms
network security
Resiliency
pubcrawl
pattern classification
pattern matching
computer network security
Decision trees
aerospace computing
Partitioning algorithms
Compositionality
tree data structures
Time complexity
aerospace communication
biblio
Video Steganography by Neural Networks Using Hash Function
Submitted by grigby1 on Mon, 02/10/2020 - 10:44am
neural nets
video steganography
video signal processing
video content
video
telecommunication security
STEM
stego video
steganography detection
Steganography
steganographic techniques
pubcrawl
PSNR
privacy
Neural networks
Artificial Neural Networks
MSE
Metrics
Image Steganography
hybrid neural networks
Hash Function
hash algorithm
hash
discrete wavelet transforms
digital video
Data mining
Cryptography
computer science
composability
biblio
Review on RFID Identity Authentication Protocols Based on Hash Function
Submitted by grigby1 on Wed, 12/20/2017 - 12:05pm
attack
authentication
Databases
hash
Human behavior
Human Factors
privacy
protocol
Protocols
pubcrawl
radiofrequency identification
Resiliency
RFID
RFIDs
Synchronization
biblio
A High Performance IPv6 Flow Table Lookup Algorithm Based on Hash
Submitted by grigby1 on Tue, 05/16/2017 - 11:29am
Algorithm
composability
hash
hash algorithms
IPv6
ipv6 security
load balancing
Metrics
pubcrawl
Resiliency
Scalability
1
2
next ›
last »