Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
NIST
biblio
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
Submitted by grigby1 on Fri, 01/22/2021 - 12:51pm
encryption
traditional cryptography algorithms
symmetric encryption
symmetric cipher
stream cipher
Salsa20
pseudorandom keys
NIST suite
NIST
lightweight cryptography
information technology
Information systems
hybrid modified lightweight algorithm
generated sequence keys
chaotic cryptography
data communication
cryptography algorithms PRESENT
Cryptography
Constrained Devices
computational complexity
Classification algorithms
Ciphers
cipher algorithm
chaotic system
chaotic communication
block ciphers
2D logistic map
pubcrawl
biblio
Stateless Security Risk Assessment for Dynamic Networks
Submitted by aekwall on Mon, 10/05/2020 - 10:53am
computer science
Dynamic Networks and Security
unpredictable security postures
stateless security risk assessment
security overview
network states
Graphical security modeling
Emerging Networking Technology
emerging networking technologies
dynamic networks
network configurations
security posture
computer network security
NIST
risk management
Metrics
composability
pubcrawl
Resiliency
software defined networking
security
Conferences
Cloud Computing
biblio
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
Submitted by aekwall on Tue, 09/08/2020 - 9:12am
chaotic system
traditional cryptography algorithms
symmetric encryption
symmetric cipher
Salsa20
pseudorandom keys
NIST suite
hybrid modified lightweight algorithm
generated sequence keys
cryptography algorithms PRESENT
cipher algorithm
block ciphers
2D logistic map
lightweight cryptography
data communication
chaotic cryptography
Cryptography
chaotic communication
Predictive Metrics
information technology
stream cipher
Ciphers
Constrained Devices
Information systems
computational complexity
NIST
composability
pubcrawl
Resiliency
Classification algorithms
encryption
biblio
Artificial Intelligence Empowered Cyber Threat Detection and Protection for Power Utilities
Submitted by grigby1 on Fri, 08/07/2020 - 2:58pm
malware
Power system protection
ML techniques
intrusion detection and prevention systems
Intrusion Detection and Prevention System
IDPS systems
cyber threat detection
AI
APT attack
Advanced Persistent Threat (APT)
power utilities
Smart Grids
APT
advanced persistent threat
cyber threats
Metrics
tools
computer security
Big Data
NIST
smart power grids
Smart Grid
power engineering computing
Scalability
Resiliency
resilience
Human behavior
pubcrawl
Artificial Intelligence
machine learning
security of data
learning (artificial intelligence)
biblio
Modeling the Operational Phases of APT Campaigns
Submitted by grigby1 on Fri, 08/07/2020 - 2:57pm
APT
Tactics Techniques and Procedures
operational reading
operational phases
Knowledge engineering
final objectives achievement
cyberspace operations
cyber threat intelligence
Cyber Kill Chain
attack chronology
APT campaigns
advanced persistent threat attacks
APT attack
Context modeling
pubcrawl
advanced persistent threat
Metrics
Decision Making
NIST
Computational modeling
Data models
Scalability
Analytical models
computer network security
Resiliency
resilience
Human behavior
biblio
Decision Support for Smart Grid: Using Reasoning to Contextualize Complex Decision Making
Submitted by grigby1 on Thu, 07/16/2020 - 10:43am
Resiliency
NIST
Ontologies
ontologies (artificial intelligence)
Ontology
open systems
power engineering computing
pubcrawl
reasoning techniques
resilience
Metrics
security
simulations
smart grid stakeholders
Smart Grids
smart power grids
Unified modeling language
university collaborators
US National Institute of Standards-and-Technology
cyber-physical system
cyber physical systems
Human Factors
Human behavior
privacy
automated decision making
cognition
composability
CPS framework model
CPS modeling
CPS Privacy
cyber-physical systems
Decision Making
decision support
Decision support systems
governance collaborators
grid topologies
industry collaborators
inference mechanisms
biblio
Hash Functions are Based on Three-Dimensional Stochastic Transformations
Submitted by aekwall on Mon, 06/08/2020 - 10:34am
stochastic methods-of-information security
input data blocks
level-of-elementary operations
memory size 4.0 Byte
output data blocks
parallel machines
pseudo-random sequence
resulting transformation
square and cube architecture
heterogeneous supercomputer technologies
stochastic protection methods
stochastic transformation
Supercomputers
three-dimensional bytes array
three-dimensional stochastic transformations
unpredictability injection
hash algorithms
Cryptography
effective protection
DOZENHASH hashing algorithm
3D stochastic transformations
Hash functions
Stochastic processes
Three-dimensional displays
Compositionality
pseudorandom number generators
statistical testing
random number generation
Generators
NIST
pubcrawl
Resiliency
information security
biblio
Using Statistical Methods and Co-Simulation to Evaluate ADS-Equipped Vehicle Trustworthiness
Submitted by aekwall on Mon, 06/01/2020 - 9:53am
safety metrics
NIST
NIST framework
OpenModelica
policy-based governance
pubcrawl
resilience
Resiliency
Ricardo IGNITE
Safety
multiple simulation platforms
security of data
sensors
simulated operational domain design
system reliability
tools
UCEF
vehicle dynamics simulators
virtual analysis functions
virtual reality
cyber-physical systems
composability
Acceleration
ADS-equipped vehicle trustworthiness
ADS-equipped vehicles
application program interfaces
automated driving system-equipped vehicles
co-simulation
complex cyber-physical systems
Computational modeling
trustworthiness
driver information systems
FMI
fractional factorial design
functional mock-up interface
internet
Measurement
middleware
middleware security
biblio
Design of Electronic Medical Record Security Policy in Hospital Management Information System (SIMRS) in XYZ Hospital
Submitted by aekwall on Mon, 04/13/2020 - 9:14am
hospitals
Triangle Policy Analysis
SIMRS
Security Control
records management
privacy control mapping
medical record management system
hospital management information system
EMR management
EMR
electronic medical record security policy
security of data
medical computing
health care
security policies
NIST
risk management
policy-based governance
pubcrawl
electronic health records
data privacy
biblio
An RSA Based Authentication System for Smart IoT Environment
Submitted by aekwall on Mon, 04/06/2020 - 9:16am
security services
X.509 Certificate
smart IoT environment
smart city apps
RSA based authentication system
remote applications
proxy induced security service provider
protocol design
Intelligent Proxies
Challenge/response Protocol
cyber physical systems
Smart City
Authentication schemes
PKI Trust Models
public key infrastructure
RSA
Scalability
IoT security
public key cryptography
authentication
NIST
Metrics
Cryptography
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
authorisation
Servers
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »