Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
Framework for Data Security Using DNA Cryptography and HMAC Technique in Cloud Computing
Submitted by grigby1 on Fri, 04/01/2022 - 12:17pm
DNA cryptography
Third Party Auditor (TPA)
Secure File Sharing
Resiliency
resilience
pubcrawl
privacy
Metrics
Human behavior
HMAC
Cloud Computing
DNA
data transfer
Data Security
Cryptography
computer architecture
composability
Communication Systems
codes
biblio
Cyber Resilience for Self-Monitoring IoT Devices
Submitted by grigby1 on Tue, 03/22/2022 - 12:45pm
Attack detection
System recovery
Trusted services
Self-monitoring
Device recovery
cyber resilience
Production facilities
Proposals
Virtual machine monitors
computer architecture
NIST
Hardware
Resiliency
resilience
pubcrawl
security
Internet of Things
biblio
A Blockchain-Based Secure Fog-Cloud Architecture for Internet of Things
Submitted by grigby1 on Tue, 03/15/2022 - 1:18pm
user privacy in the cloud
blockchain
blockchains
Cloud Computing
computer architecture
Conferences
Fog computing
IoT
privacy
pubcrawl
Scalability
Scalable Security
security
sensors
smart contract
biblio
Offensive and Defensive Countermeasure Technology of Return-Oriented Programming
Submitted by aekwall on Mon, 03/14/2022 - 12:35pm
Information systems
rop attacks
system security
social computing
development status
confrontation and defense
Buffer overflows
return-oriented programming
codes
security
programming
composability
Resiliency
Scalability
pubcrawl
computer architecture
Human Factors
biblio
MAJORCA: Multi-Architecture JOP and ROP Chain Assembler
Submitted by aekwall on Mon, 03/14/2022 - 12:34pm
gadget
rop attacks
ROP compiler
ROP chain
ROP benchmark
ROP
return-oriented programming
restricted symbols
Payload
Jump-Oriented Programming
JOP
gadget frame
gadget catalog
Benchmark testing
code-reuse attack
codes
Registers
composability
Resiliency
Scalability
pubcrawl
Heuristic algorithms
operating systems
computer architecture
Human Factors
Measurement
biblio
Analysis of Anomaly Detection Approaches Performed Through Deep Learning Methods in SCADA Systems
Submitted by grigby1 on Mon, 03/14/2022 - 11:36am
Resiliency
feature learning
SCADA Systems Security
Extreme learning machines
Industrial Control Systems
SCADA
Compositionality
SCADA systems
Software
computer architecture
resilience
Human behavior
pubcrawl
Intrusion Detection
Anomaly Detection
Training
deep learning
biblio
Federated Machine Learning Architecture for Searching Malware
Submitted by grigby1 on Mon, 03/14/2022 - 11:15am
malware detection
ML–computing
mathematical models
malware sandbox
logic-vector analysis
federated machine learning
cloud–edge computing
cloud sandbox
signature
cyber-physical system
Policy Based Governance
computer architecture
sandboxing
malware
composability
Computational modeling
Analytical models
collaboration
pubcrawl
machine learning
Training
biblio
Neural Style Transfer Using VGG19 and Alexnet
Submitted by grigby1 on Wed, 03/09/2022 - 11:57am
AlexNet
VGG19
Total Loss Convolution Neural Network
telecommunication computing
Tanh
style loss
style image
Sigmoid
Relu
Output styled image
input image
Creativity
Content Loss
computer architecture
Activation Function
neural style transfer
ART
automation
Metrics
Scalability
Resiliency
resilience
pubcrawl
convolution
deep learning
biblio
Porting Caching Functions to Named Data Networking Forwarding Daemon (NFD)
Submitted by aekwall on Tue, 03/08/2022 - 1:43pm
computer architecture
Protocols
Scalability
Conferences
pubcrawl
Resiliency
Human behavior
Probabilistic logic
Computers
information-centric networking
named data networking
Ports (Computers)
cache strategy
NDN forwarding daemon
porting
biblio
Information Security Protection of Power System Computer Network
Submitted by grigby1 on Wed, 03/02/2022 - 12:53pm
network information security
Resiliency
resilience
public key infrastructure
pubcrawl
Prediction algorithms
power systems
power system
Power measurement
Access Control
Networked Control Systems Security
Metrics
Market research
computer networks
computer architecture
composability
Authority Management
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »