Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hardware resources
biblio
Using Machine Learning to Detect DoS Attacks in Wireless Sensor Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:41pm
machine learning techniques
WSN
wireless sensor networks
threat vectors
Support vector machines
security threats
security
Routing protocols
pubcrawl
privacy
Metrics
Measurement
attack signature
learning (artificial intelligence)
intrusion detection-and-prevention system
intrusion detection system
hardware resources
DoS attacks
denial-of-service attack
denial of service
decision trees technique
Decision trees
computer network security
biblio
Hardware implementation of Piccolo Encryption Algorithm for constrained RFID application
Submitted by aekwall on Mon, 02/10/2020 - 11:44am
piccolo encryption algorithm
4 input LUTs
64 bits block size
area optimization
ASIC
constrained RFID application
different design strategies
efficient hardware architecture
Fiestel structure
hardware design
hardware metrics
low resource applications
optimized area
Piccolo Algorithm
128 bits
piccolo lightweight algorithm
radiofrequency identification
relevant lightweight block ciphers
severe security concerns
supports high speed
Throughput.
tremendous pace
ultra-lightweight applications
variable key size
word length 64.0 bit
word length 80.0 bit
Xillinx
Microelectronics Security
security applications
field programmable gate arrays
FPGA
Cryptography
encryption
Internet of Things
telecommunication security
Hardware
Table lookup
IoT applications
smart devices
Resiliency
pubcrawl
composability
IoT
RFID
Throughput
Ciphers
security issues
Predictive Metrics
private information
word length 128.0 bit
Hardware Implementation
hardware resources
lightweight cryptographic algorithms
S-box
lightweight cryptography
biblio
A Collaborative DDoS Mitigation Solution Based on Ethereum Smart Contract and RNN-LSTM
Submitted by aekwall on Wed, 12/18/2019 - 2:24pm
mitigation technique
effective DDoS defence
ethereum
ethereum smart contract
hardware resources
Human behavior
individual DDoS attack class
learning (artificial intelligence)
Lightning
Metrics
distributed denial-of-service
pubcrawl
recurrent neural nets
resilience
Resiliency
RNN-LSTM
signalling DDoS system
smart contracts
telecommunication signalling
telecommunication traffic
computer network security
autonomous systems
blockchain
blockchain technology
collaboration
collaborative DDoS mitigation solution
collaborative protection mitigation
complex configuration
composability
Computer crime
attack traffic flow
coordinated DDoS mitigation approaches
cryptocurrencies
DDoS attack mitigation
ddos mitigation
deep learning
Deep learning DDoS detection system
defence capabilities
defence mechanisms
defence systems
biblio
Hardware Implementation of Multi-Scroll Chaos Based Architecture for Securing Biometric Templates
Submitted by grigby1 on Fri, 03/22/2019 - 12:35pm
hardware resources
Xilinx FPGA
Xilinx
Security analysis
security
Scalability
Resiliency
resilience
real-time systems
pubcrawl
multiscroll chaos based architecture
multi-scroll
Metrics
Mathematical model
low cost image encryption
Image Processing
biometric encryption
Hardware
FPGA
field programmable gate arrays
Euler method
embedded systems
embedded biometric systems
Cryptography
computer architecture
chaotic N × N grid multiscroll system
chaotic communication
chaos-based multiscroll encryption algorithm
chaos
biometrics-based personal authentication systems
biometrics (access control)
biometric templates
biblio
Performance Evaluation of Cryptography on Middleware-Based Computational Offloading
Submitted by grigby1 on Mon, 06/11/2018 - 3:47pm
mobile cloud computing paradigm
collaboration
malicious attacks
power consumption
policy-based governance
computational
computational offloading
critical data
data authenticity
mobile cloud computing
Policy
mobile cloud infrastructure
mobile cloud servers
Offloading
offloading operations
resource-intensive applications
saving processing
smartphone offloads
wireless access media
middleware security
mobile computing
security
pubcrawl
Reliability
composability
Cryptography
Mobile communication
encryption
Cloud Computing
Servers
resilience
security mechanisms
resource allocation
data integrity
mobile devices
performance evaluation
middleware
hardware resources
Resiliency
biblio
Securing Real-Time Cyber-Physical Systems Using WCET-Aware Artificial Diversity
Submitted by grigby1 on Wed, 05/09/2018 - 2:57pm
software errors
real-time systems
resilience
Resiliency
Safe Coding
safe diversity approach
safety-critical real-time systems
safety-critical software
security
security of data
real-time processes
software vulnerabilities
static WCET analysis
timing
timing guarantees
timing properties
unacceptable performance overheads
WCET
WCET-aware artificial diversity
worst case execution time
Layout
artificial software diversity
block-level diversity
code-reuse attacks
collaboration
cyber-physical systems
embedded systems
hardware resources
Human Factors
individual probability
Artificial Diversity
Metrics
movable instruction sequences
policy-based governance
Policy-Governed Secure Collaboration
probability
pubcrawl
real-time
real-time cyber-physical systems
biblio
Performance analysis of symmetric block cryptosystems on Android platform
Submitted by grigby1 on Wed, 02/21/2018 - 1:46pm
resilience
microprocessor chips
mobile communications
multicore CPUs
parallel processing
parallelization
parameter selection
Performance analysis
plaintext size
Protocols
pubcrawl
Metrics
Resiliency
Scalability
software resources
standards
symmetric block ciphers
symmetric block cryptosystems
symmetric ciphers
terminal devices
Three-dimensional displays
variable parameters
cryptosystem performance
AES
android encryption
Android platform
Androids
appropriate cryptosystem
authentication
Ciphers
core element
cryptographic communications systems
Cryptography
3DES
different operating modes
encryption
hardware resources
Human behavior
Human Factors
Humanoid robots
integrity
key size
message confidentiality
biblio
Generalize or Die: Operating Systems Support for Memristor-Based Accelerators
Submitted by grigby1 on Fri, 02/02/2018 - 1:25pm
memristors
ultra low energy
typical OS functionality
transistor feature size scaling
specialized accelerators
scientific computing
Scalability
Resiliency
quantum computing security
pubcrawl
programming
primary function
operating systems (computers)
operating system
microprocessor chips
Metrics
accelerator implementation
Memristor
master slave models
machine learning
learning (artificial intelligence)
Imaging
hardware resources
Hardware
general purpose system
field programmable gate arrays
Engines
Electronic mail
Dot Product Engine
computer architecture
composability
biblio
A flexible and scalable implementation of elliptic curve cryptography over GF(p) based on ASIP
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
hardware resources
Software algorithms
Resiliency
public-key cryptosystems
public-key cryptography schemes
public key cryptography
pubcrawl
prime fields
point multiplication
optimization
Metrics
Instruction sets
Instruction Set Architecture
Algorithm design and analysis
FPGA
field-programmable gate array platform
field programmable gate arrays
Elliptic curves
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECC-ASIP model
ECC custom instructions
custom instruction set
composability
code storage space
application specific instruction set processor