Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptographic methods
biblio
Security Analysis of Forward Error Correction Codes in Relay Aided Networks
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
relay aided networks
Metrics
network coding
nonfunctional requirements
physical layer security
physical layer security scheme
physical layer security techniques
Predictive Metrics
pubcrawl
random error vector
Receivers
relay aided network security
McEliece cryptosystem.
Relays
Reliability
Resiliency
secure communication
security
security level
security performance
transmission
transmitted information
wireless sensor networks
Error control codes
composability
cryptographic methods
Cryptography
cyber physical systems
data confidentiality
decentralized relay nodes
Decoding
eavesdropper
encoding
energy efficiency requirements
Channel models
error correction codes
error probability
error statistics
FEC coding schemes
forward error correction
forward error correction codes
Golay codes
industrial wireless sensor networks
IWSN setups
iwsns
biblio
Abstract Model of Eavesdropper and Overview on Attacks in Quantum Cryptography Systems
Submitted by aekwall on Mon, 03/30/2020 - 11:41am
promptly developed areas
document circulation
extended classification
human life
important directions
information confidentiality
information transactions
loophole of the device
mini-computer
non-coherent attack
open communication networks
cryptographic methods
quantum cryptography methods
quantum cryptography systems
quantum cryptosystems
quantum hacking
quantum key distribution equipment
reliable information security technology
reliable security
specific quantum systems
traditional cryptography methods
quantum computing security
Reliability
Computer crime
Scalability
data privacy
telecommunication security
Protocols
Resiliency
pubcrawl
composability
classification
Handheld computers
security of data
quantum cryptography
quantum computing
Predictive Metrics
information technologies
Quantum Key Distribution
quantum protocols
abstract eavesdropper model
coherent attack
commercially available quantum key distribution system
biblio
Misbehavior Detection Using Machine Learning in Vehicular Communication Networks
Submitted by grigby1 on Mon, 03/02/2020 - 1:37pm
misbehavior detection system
vehicular networks
vehicular network system
vehicular ad hoc networks
Task Analysis
sybil attacks
Sybil attack
service attack
Resiliency
resilience
realistic vehicular network environment
pubcrawl
Neural networks
mobile computing
composability
Metrics
Media
machine learning
learning (artificial intelligence)
insider attacks
Generators
false alert generation attack
Databases
Data mining
Cryptography
cryptographic methods
Context modeling
biblio
An Improved (k,p,l)-Anonymity Method for Privacy Preserving Collaborative Filtering
Submitted by grigby1 on Mon, 04/02/2018 - 12:30pm
matrix sparsity reduction
Resiliency
resilience
recommender systems
pubcrawl
Privacy Preserving Collaborative Filtering
privacy
PPCF
Perturbation methods
Partitioning algorithms
obfuscation methods
Metrics
Maximum Distance to Average Vector microaggregation algorithm
anonymity
matrix algebra
Latent Factor Model
k-anonymity method
Human behavior
data privacy
data aggregation
Cryptography
cryptographic methods
composability
collaborative filtering
collaboration
biblio
Design and analysis of high performance crypt-NoSQL
Submitted by grigby1 on Thu, 12/28/2017 - 1:40pm
NoSQL databases
YCSB
Yahoo
storage management
SQL
Service Level Agreement
security scalability
security
secure data encryption
Scalability
relational databases
relational database security
query processing
pubcrawl
Performance
Benchmark testing
NoSQL
necessary data security
middleware layer
middleware
high performance crypt-NoSQL
encryption
Data Security
Cryptography
cryptographic methods
cloud service benchmark
cloud service
Cloud Computing
Cassandra
Big Data