Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer architecture
biblio
Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things
Submitted by grigby1 on Thu, 03/04/2021 - 3:05pm
Scalability
zero trust
usage control
Smart homes
trust
ABAC
Prototypes
authorization
privacy
computer architecture
Resiliency
resilience
policy-based governance
Human Factors
pubcrawl
IoT
Monitoring
Internet of Things
biblio
A Scalable Blockchain-based Approach for Authentication and Access Control in Software Defined Vehicular Networks
Submitted by grigby1 on Tue, 02/23/2021 - 2:58pm
security
Resiliency
Scalability
scalable architecture
scalable blockchain-based approach
SDN
SDN controllers
SDVN devices
SDVN features
SDVN requirements
resilience
security issues
software defined networking
software defined vehicular networking
software defined vehicular networks
telecommunication network planning
telecommunication security
unauthorized SDN controller
unauthorized switch
vehicular ad hoc networks
control systems
access control issues
access control mechanism
authentication
authorisation
authorization
blockchain
blockchain ledger
blockchain technology
computer architecture
Access Control
cryptocurrencies
Distributed databases
heterogeneous networks
interconnected blockchain sub-networks
IoV
message authentication
Network reconnaissance
open systems
pubcrawl
biblio
Malicious user identification scheme for network coding enabled small cell environment
Submitted by grigby1 on Tue, 02/23/2021 - 2:35pm
telecommunication network reliability
Small Cells
small cell technology
reliable communication
Pollution
next generation communication technologies
network coding environment
malicious user identification scheme
fifth generation of communication networks
device to device communication
dense network coding
next generation networks
Microprocessors
5G
network coding
cooperative communication
computer architecture
Communication networks
wireless network
Protocols
composability
cellular radio
5G mobile communication
telecommunication security
Throughput
Resiliency
resilience
Metrics
pubcrawl
Peer-to-peer computing
security
biblio
Highly Area-Efficient Implementation of Modular Multiplication for Elliptic Curve Cryptography
Submitted by aekwall on Mon, 02/15/2021 - 4:55pm
koblitz Curve
Virtex-7 FPGA technology
Throughput
Table lookup
Scalability
Resiliency
Registers
public-key cryptosystem
Public Key Cryptography (PKC)
public key cryptography
pubcrawl
multiplying circuits
Metrics
LUT-FF pairs
logic design
256-bit modified interleaved modular multiplication
Interleaved Modular Multiplication (IMM)
IMM
hardware implementation design
Hardware Architecture (HA)
Hardware
flip-flops
field programmable gate arrays
Field Programmable Gate Array (FPGA)
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECC operation
Cryptography
cryptographic operation
computer architecture
biblio
Smart Surveillance as an Edge Service for Real-Time Human Detection and Tracking
Submitted by grigby1 on Mon, 02/08/2021 - 2:04pm
policy makers
video surveillance
urban surveillance
urban planners
tracking tasks
Task Analysis
surveillance
smart surveillance
situational awareness
security
Scalability
Resiliency
resilience
real-time human detection
Real time Human Detection and Tracking
pubcrawl
composability
performance evaluation
object tracking
object detection
Metrics
Image edge detection
fog
feature extraction
edge-fog layers
edge service
edge detection
dynamic data-driven tasks
Decision Making
critical data-driven tasks
computer architecture
biblio
ARtect, an augmented reality educational prototype for architectural design
Submitted by grigby1 on Wed, 02/03/2021 - 1:11pm
resilience
digital instrument
education
educational interactive tool
exterior environments
Human behavior
Human Factors
immersive tool
privacy
pubcrawl
rendering (computer graphics)
design proposal
Solid modeling
solid modelling
Three-dimensional displays
tools
Two dimensional displays
Unity 3D
user interfaces
user-friendly interface
virtual reality
visualization
augmented reality
2d graphic
2D graphic visualisation
3D carton models
3d models
application
architectural design process
architectural project
architecture
ARtect
artists
immersive systems
augmented reality educational prototype
CAD
composability
computer aided instruction
computer architecture
custom-made 3D model visualisation
cyber physical systems
data visualisation
design
biblio
Organisation and Implementation of ResNet Face Recognition Architectures in the Environment of Zigbee-based Data Transmission Protocol
Submitted by grigby1 on Thu, 01/28/2021 - 1:34pm
pubcrawl
Zigbee
wireless sensor networks
Wireless fidelity
Task Analysis
Scalability
ResNet
Resiliency
resilience
Raspberry Pi
android encryption
Protocols
Metrics
IEEE 802.15.4
Human behavior
face recognition
computer architecture
Cameras
Arduino
biblio
Independent credible: Secure communication architecture of Android devices based on TrustZone
Submitted by grigby1 on Thu, 01/28/2021 - 1:32pm
Metrics
TrustZone
TEE
smart phones
security
Scalability
Resiliency
resilience
pubcrawl
android encryption
Human behavior
Hardware
encryption
ECDH
Cryptography
computer science
computer architecture
android
biblio
A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks
Submitted by aekwall on Mon, 01/25/2021 - 1:03pm
atomic-level vulnerabilities
formal verification
Internet of Things systems
SCADA networks
networked system
cyber-physical systems security
attack graphs
A2G2V algorithm
architecture description tool
Predictive Metrics
attack graph
automatic attack graph generation
control networks
Cyber-Physical Systems (CPS)
enumerating counterexamples
model-checking tools
model-checking-based automated attack graph generator and visualizer
visualization tool
composability
computer network security
Internet of Things
Internet of Things (IoT)
computer architecture
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
security
graph theory
Computational modeling
tools
computer networks
model checking
data visualisation
visualization
biblio
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks
Submitted by aekwall on Mon, 01/25/2021 - 1:02pm
security
Protocols
Software
computer architecture
Resiliency
pubcrawl
composability
Databases
tools
risk management
network attacks
Predictive Metrics
attack graph
attack graphs
MulVal
network protocols
« first
‹ previous
…
22
23
24
25
26
27
28
29
30
…
next ›
last »