Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer technology
biblio
Intellectual Property Protection for AI-Related Inventions in Japan
Submitted by grigby1 on Thu, 07/30/2020 - 1:50pm
computer technology
ip protection
Technological innovation
patents
patent examination guidelines
patent eligibility review
Patent Eligibility
patent analysis
Japanese patent office
Japan's artificial intelligence technology
Invention
Intellectual Property Protection
intellectual property offices
Government
learning (artificial intelligence)
computer related invention
artificial intelligence related inventions
AI-related inventions
Law
composability
Artificial Intelligence
Guidelines
Software
Resiliency
resilience
policy-based governance
pubcrawl
biblio
Research on Improving Network Security of Embedded System
Submitted by aekwall on Mon, 06/15/2020 - 10:55am
information technology
Servers
Resiliency
pubcrawl
promotion countermeasures
network security
network attack
mobile embedded systems
Metrics
IPsec
internet
authentication
embedded systems
embedded system network
Embedded System
embedded network security
computer technology
computer network security
composability
Communication networks
certification
brand-new computer technology
biblio
The Evaluation of the Cryptographic Strength of Asymmetric Encryption Algorithms
Submitted by grigby1 on Mon, 04/02/2018 - 12:48pm
Elliptic curves
Supercomputers
RSA algorithm
Resistance
Resiliency
resilience
pubcrawl
Metrics
method
Human behavior
GOST R 34.10-2001 algorithm
encryption
Algorithm design and analysis
durability
Cryptography
cryptographic strength
computer technology
Compositionality
Clustering algorithms
asymmetric encryption algorithms
asymmetric encryption algorithm
Asymmetric Encryption
Assessment