Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
NP-hard problem
biblio
Nature-inspired Metaheuristic Effectiveness Used in Phishing Intrusion Detection Systems with Firefly Algorithm Techniques
Submitted by grigby1 on Fri, 01/13/2023 - 1:31pm
Computer hacking
Support vector machines
Intrusion Detection
pubcrawl
resilience
Resiliency
Scalability
Classification algorithms
Phishing
NP-hard problem
Security Heuristics
firefly algorithm
metaheuristics
Nature Inspired
biblio
Graph-Based Lattices Cryptosystem As New Technique Of Post-Quantum Cryptography
Submitted by grigby1 on Fri, 05/20/2022 - 4:31pm
Cryptography
pubcrawl
quantum computing
composability
encoding
Compositionality
NP-hard problem
Lattices
lattice
degree sequence
graphic lattice
Graphics
ice-flower system
sufficient conditions
topological coding
theoretical cryptography
biblio
Dynamic Graph Based Encryption Scheme for Cloud Based Services and Storage
Submitted by grigby1 on Tue, 05/03/2022 - 4:56pm
NP-hard
Software
Security Heuristics
Scalability
Resiliency
resilience
pubcrawl
predictability
NP-hard problem
Cloud Computing
Mobile handsets
Heuristic algorithms
graph partition
Genetics
fine-grained
computer architecture
Cloud Security
biblio
Analysis of public-key cryptography using a 3-regular graph with a perfect dominating set
Submitted by aekwall on Mon, 01/31/2022 - 4:13pm
NP-hard problem
White Box Security
Resiliency
quantum computing
Pur
public-key cryptography
public key cryptography
pubcrawl
performance evaluation
perfect dominating set
white box cryptography
NP-complete
NIST
minus dominating function
encryption
Computers
3-regular graph
Metrics
resilience
composability
biblio
Stackelberg Equilibria for Two-Player Network Routing Games on Parallel Networks
Submitted by grigby1 on Wed, 07/28/2021 - 8:47am
Computing Theory
Games
Measurement
Metrics
NP-hard problem
pubcrawl
Routing
security
Security Metrics
uncertainty
biblio
A Reinforcement Learning-Based Virtual Machine Placement Strategy in Cloud Data Centers
Submitted by grigby1 on Thu, 07/08/2021 - 2:25pm
pubcrawl
Weight measurement
Virtual machining
virtual machine security
virtual machine placement
virtual machine
security
Resiliency
resilience
Reinforcement learning
Cloud Computing
NP-hard problem
High performance computing
Energy Savings.
energy consumption
data centers
Cyber Physical System
Cryptography
composability
cloud data centers
biblio
Particle Swarm Optimization Algorithm with Variety Inertia Weights to Solve Unequal Area Facility Layout Problem
Submitted by aekwall on Mon, 12/14/2020 - 12:38pm
Compositionality
workshop area utilization
unequal area facility layout problem
UA-FLPP
NP-hard problem
nonlinear inertia weight
Inertia Weight
facilities layout
dynamic inertia weight
PSO algorithm
Swarm intelligence algorithm
Layout
Conferences
computational complexity
Analytical models
Production
particle swarm optimization algorithm
particle swarm optimization
Swarm Intelligence
particle swarm optimisation
convergence
simulation
composability
pubcrawl
biblio
Detecting Centralized Architecture-Based Botnets using Travelling Salesperson Non-Deterministic Polynomial-Hard problem-TSP-NP Technique
Submitted by grigby1 on Fri, 09/11/2020 - 12:08pm
Botnet detection
botnet
TSP-NP hard problem
travelling salesperson nondeterministic polynomial-hard problem-TSP-NP technique
travelling salesman problems
traveling salesperson person
NP-hard problem
nondeterministic polynomial-time hardness
deterministic
Detecting
centralized botnet architecture
centralized architecture-based botnets
Centralized
botnet developers
botnet detection accuracy
pubcrawl
botmaster
attack techniques
combinatorial optimization
Compositionality
optimisation
Metrics
DDoS Attacks
botnets
invasive software
Computer crime
architecture
internet
computer network security
Resiliency
biblio
Virtual MIMO-based cooperative beamforming and jamming scheme for the clustered wireless sensor network security
Submitted by grigby1 on Mon, 11/20/2017 - 12:19pm
security
Policy
policy-based governance
pubcrawl
QCQP
QoS constraints
quadratically constrained quadratic problem
quality of service
quality-of-service constraints
Resiliency
SCIP algorithm
physical layer security
sensor nodes
solving constraint integer programs
telecommunication security
total energy consumption
transmitting antennas
virtual MIMO-based cooperative beamforming and jamming
virtual multiinput multioutput communication architecture
Wireless Sensor Network
wireless sensor networks
WSN
cooperative communication
array signal processing
artificial neural network
Artificial Neural Networks
artificial noise
beamforming
beamforming vector optimization
cluster-based cooperative wireless sensor networks
clustered wireless sensor network security
collaboration
computational complexity
antenna
energy consumption
Governance
Government
integer programming
Jamming
jamming vector optimization
MIMO
MIMO communication
MISO
NP-hard problem