Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
Low-Latency Modular Exponentiation for FPGAs
Submitted by grigby1 on Tue, 07/18/2023 - 3:21pm
computer architecture
pubcrawl
resilience
field programmable gate arrays
Scalability
delays
Complexity theory
Resiliency
Costs
blockchains
Human Factors
exponentiation
Low latency communication
biblio
On Securing the Communication in IoT Infrastructure using Elliptic Curve Cryptography
Submitted by grigby1 on Fri, 07/14/2023 - 3:18pm
computer architecture
Internet of Things
IoT
pubcrawl
Metrics
resilience
Resiliency
Scalability
Cryptography
Elliptic curve cryptography
software reliability
software quality
Sensitivity
Computational efficiency
Elliptic-curve
biblio
A Security Architecture for Cloud Data Using Hybrid Security Scheme
Submitted by grigby1 on Fri, 07/14/2023 - 10:49am
Compositionality
encryption audits
ECC DNA
data integrity
Resiliency
cloud storage
DNA
hashing
Systematics
computer architecture
Data Security
privacy
resilience
Metrics
pubcrawl
Organizations
Cloud Computing
encryption
biblio
Trust-Aware Security system for Dynamic Southbound Communication in Software Defined Network
Submitted by grigby1 on Wed, 07/12/2023 - 12:48pm
Complexity theory
southbound communication
control plane
Awareness
data plane
dynamic networks
software defined networking
Technological innovation
trust
Scalability
computer architecture
SDN
composability
performance evaluation
Resiliency
resilience
Metrics
pubcrawl
security
biblio
AEaaS: Artificial Intelligence Edge-of-Things as a Service for Intelligent Remote Farm Security and Intrusion Detection Pre-alarm System
Submitted by grigby1 on Mon, 07/10/2023 - 3:36pm
composability
farm security system
smart agriculture
Resiliency
fog
edge detection
edge computing
Systematics
Image edge detection
real-time systems
computer architecture
Scalability
resilience
Metrics
pubcrawl
Intrusion Detection
IoT
security
Cloud Computing
biblio
Fakequipo: Deep Fake Detection
Submitted by grigby1 on Thu, 06/29/2023 - 4:10pm
Human behavior
Visual Transformer
Training
Technological innovation
Scalability
Resiliency
resilience
pubcrawl
Metrics
DeepFake
generative adversarial networks
gan
Deepfakes
deep learning
Deep Fake Detection
computer vision
computer architecture
biblio
Analyzing Metadata in PDF Files Published by Police Agencies in Japan
Submitted by grigby1 on Thu, 06/22/2023 - 4:14pm
software reliability
sanitization
PDF files
Open Data
Resiliency
law enforcement
targeted attacks
Data Sanitization
software quality
hidden data
computer architecture
Compositionality
component
metadata
composability
resilience
pubcrawl
security
Organizations
biblio
A DDoS attack detection method based on deep learning two-level model CNN-LSTM in SDN network
Submitted by grigby1 on Thu, 06/22/2023 - 2:27pm
computer architecture
deep learning
feature extraction
pubcrawl
Human behavior
Metrics
resilience
telecommunication traffic
Computer crime
composability
Stability analysis
DDoS Attack
denial-of-service attack
DDoS attack detection
Resiliency
Attack detection model
biblio
Sensor Data Protection in Cyber-Physical Systems
Submitted by grigby1 on Fri, 06/09/2023 - 1:48pm
computer architecture
Training
CPS
pubcrawl
resilience
Resiliency
real-time systems
cyber-physical systems
actuators
Software Architecture
Sensor Systems
fault tolerance
ROS
robots
image sensors
biblio
Quantitative safety-security risk analysis of interconnected cyber-infrastructures
Submitted by grigby1 on Fri, 06/09/2023 - 1:12pm
computer architecture
security
pubcrawl
resilience
Analytical models
Measurement
Reliability
Synchronization
statistical analysis
attack-fault trees
Resiliency
cyber risk assessment
reliability block diagrams
Safety-security risk analysis
Cybersecurity Damage Assessment
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »