Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber physical systems
biblio
The Problems of Design and Application of Switching Neural Networks in Creation of Artificial Intelligence
Submitted by aekwall on Thu, 05/13/2021 - 10:31am
Resiliency
pubcrawl
policy-based governance
Metrics
Neurons
Training
control systems
Artificial Neural Networks
Biological neural networks
Neural networks
Switches
Artificial Intelligence
Supercomputers
cyber physical systems
biblio
Application of the Neural Networks for Cryptographic Information Security
Submitted by aekwall on Thu, 05/13/2021 - 10:30am
cyber physical systems
training set
Training
Switches
Secret key
pubcrawl
Neurons
information technology
information security
Neural Network Security
Cryptography
block ciphering
Biological neural networks
Artificial Neural Networks
Metrics
policy-based governance
Resiliency
cyber-physical systems
biblio
Network Security Situation Prediction in Software Defined Networking Data Plane
Submitted by aekwall on Thu, 05/13/2021 - 10:30am
cyber physical systems
time series classification
Switches
software-defined network
security
pubcrawl
Predictive models
Prediction algorithms
Neural networks
network security
Neural Network Security
computer science
Communication networks
bidirectional long short-term memory network
Artificial Neural Networks
Metrics
policy-based governance
Resiliency
cyber-physical systems
biblio
Research on Information Security Evaluation Based on Artificial Neural Network
Submitted by aekwall on Thu, 05/13/2021 - 10:30am
artificial intelligence security
artificial neural network
Artificial Neural Networks
cyber physical systems
evaluation
Information encryption
information security
Metrics
policy-based governance
pubcrawl
Resiliency
biblio
Lightweight Testbed for Cybersecurity Experiments in SCADA-based Systems
Submitted by grigby1 on Tue, 02/23/2021 - 1:58pm
reconnaissance attack
Network reconnaissance
network scanning
network traffic
Open area test sites
pattern classification
physical damages
Protocols
pubcrawl
network classification model
resilience
Resiliency
SCADA
SCADA systems
SCADA-based Systems
Scalability
telecommunication traffic
testbed
cybersecurity experiments
computer network security
computer security
container-based SCADA testbed
Containers
critical infrastructure
critical infrastructures
cyber physical systems
cyber-attacks
ARP Spoofing
Docker
experimental testbeds
financial damages
interoperable platform
learning (artificial intelligence)
machine learning
man in the middle attack
MITM Attack
biblio
Image Encryption Using Genetic Algorithm and Bit-Slice Rotation
Submitted by aekwall on Mon, 02/15/2021 - 3:51pm
Generators
structural similarity index measure
SSIM
Sociology
Resiliency
pubcrawl
Indexes
image encryption algorithms
image encryption
Image coding
Genetics
genetic algorithms
genetic algorithm
bit plane rotation
fully encrypted image
encryption
efficient encryption
digital image
cyber physical systems
cryptography attacks
Cryptography
composability
chaotic encryption
bit-slice rotation
bit plane slicing
Bit Plane Slice
biblio
Efficient Auto key based Encryption and Decryption using GICK and GDCK methods
Submitted by aekwall on Mon, 02/15/2021 - 3:51pm
GICK
Statistics
Sociology
Resiliency
pubcrawl
primary key
Key Genetic Algorithm
key generation
Heuristic algorithms
Hamming distance
artificial intelligence techniques
genetic algorithms
GDCK
encryption keys
efficient encryption
cyber physical systems
Cryptography
Conferences
composability
Biological cells
biblio
Encryption algorithm based on knight’s tour and n-neighbourhood addition
Submitted by aekwall on Mon, 02/15/2021 - 3:50pm
Knight’s Tour Matrix
Signal processing algorithms
signal processing
Resiliency
pubcrawl
Partitioning algorithms
n-neighbourhood addition
n-neighborhood addition
Matrix converters
matrix algebra
KT matrix
Knight’s Tour Problem (KTP)
composability
Knight's Tour Problem
knight tour matrix
Image Processing
image encryption
encryption algorithm
encryption
efficient encryption
digital images
cyber physical systems
Cryptography
cover images
biblio
Privacy-Preserving and Efficient Sharing of Drone Videos in Public Safety Scenarios using Proxy Re-encryption
Submitted by aekwall on Mon, 02/15/2021 - 3:50pm
surveillance videos
Proxy Reencryption
pubcrawl
public safety applications
public safety scenarios
realistic simulation environment
Resiliency
road safety
storage management
streaming
Proxy re-encryption
trusted control center
Unmanned Aerial Vehicles
Video communication
video recording
video streaming
video surveillance
video transmission
Videos
encryption
Cloud Computing
cloud storage
composability
Cryptography
cyber physical systems
data privacy
drones
efficient drone video sharing
efficient encryption
autonomous aerial vehicles
Intelligent Transportation Systems
law enforcement
Long Term Evolution
original encryption key
privacy
privacy concerns
privacy preserving
privacy-preserving Sharing
biblio
A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing
Submitted by aekwall on Mon, 02/15/2021 - 3:49pm
Secure storage
party proxy
Performance analysis
private key cryptography
Proxy re-encryption
pubcrawl
re-encrypted cloud data
re-encrypted data
Resiliency
Focusing
Servers
sharing approaches
storage management
system user setting
target user group
telecommunication security
tools
user data
data owner
Broadcasting
Cloud Computing
Cloud Server Provider
cloud storage
composability
conditional proxy broadcast re-encryption technology
cyber physical systems
data encryption
Broadcast Encryption
data privacy
data sharing
dynamic cloud environment
dynamic conditional proxy broadcast re-encryption scheme
dynamic conditional proxy broadcast reencryption scheme
efficient encryption
encryption
fixed system user setup
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »