Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
memory usage
biblio
On the Feasibility of Homomorphic Encryption for Internet of Things
Submitted by grigby1 on Fri, 08/11/2023 - 11:31am
Libraries
Profiling Energy Consumption
Optimization schemes
Microsoft SEAL
memory usage
HElib
CPU Utilisation
Seals
Homomorphic encryption
Internet of Things (IoT)
energy consumption
Internet of Things
Scalability
performance evaluation
Hardware
Resiliency
resilience
Metrics
Human Factors
Human behavior
pubcrawl
biblio
Overhead Analysis of the Use of Digital Signature in MQTT Protocol for Constrained Device in the Internet of Things System
Submitted by aekwall on Mon, 02/08/2021 - 1:47pm
decryption time
Message Queue Telemetry Transport protocol
digital signature mechanism
memory usage
class-2 device
class-l device
constrained device
constrained-device
constrained-devices
MQTT protocol
flash usage
Internet of Things system
message delivery time
Message Queue Telemetry Transport
overhead analysis
signature verification performance
transmission process
computer network security
queueing theory
security mechanism
Payloads
digital signatures
pubcrawl
Resiliency
transport protocols
Protocols
Cryptographic Protocols
security
Memory management
Internet of Things
encryption
digital signature
Scalability
biblio
Quality of Service (QoS) Comparison Analysis of Snort IDS and Bro IDS Application in Software Define Network (SDN) Architecture
Submitted by grigby1 on Tue, 12/01/2020 - 1:45pm
Snort
QoS measurement
quality of service
resilience
Resiliency
SDN
SDN architecture
service comparison analysis
signature based detection method
QoS
Snort IDS
software define network architecture
software defined networking
telecommunication traffic
testing
Throughput
tools
pubcrawl
packet loss parameters
Packet loss
network quality
network activity
memory usage
intrusion detection system
IDS
existing network traffic
delays
CPU usage
computer network security
composability
bro IDS application
Bro
anomaly based detection method
biblio
NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering
Submitted by aekwall on Mon, 08/03/2020 - 10:28am
adaptive filters
adaptive filtering
Tofino switch
programmable switches
NETHCF
memory usage
memory resources
IP2HC
IP-to-Hop-Count mapping table
IP popularity
in-network system
HCF system
end-to-end routing
design adaptive mechanisms
adaptive spoofed IP traffic filtering
computer network security
telecommunication switching
Switches
Pipelines
Bandwidth
telecommunication network routing
internet
Metrics
pubcrawl
Resiliency
Kernel
telecommunication traffic
Servers
Scalability
IP networks
biblio
Mean-Removed Product Quantization for Approximate Nearest Neighbor Search
Submitted by grigby1 on Fri, 05/22/2020 - 2:31pm
high-dimensional space
Vectors
vector quantisation
subspaces
scalar quantizer
retrieval speed
residual vectors
quantisation (signal)
product quantization
PQ
mean-removed vector quantization
mean-removed product quantization
low-dimensional subspaces
high-dimensional vector space
pubcrawl
data point
codewords
nearest neighbor search
Cartesian product
approximate nearest neighbor search
information retrieval
search problems
memory usage
nearest neighbour methods
Measurement
Metrics
neural nets
biblio
Performance Analysis of Symmetric Key Cryptographic Algorithms
Submitted by grigby1 on Tue, 10/15/2019 - 2:45pm
secure data transfers
memory usage
Metrics
online data exchange
Performance analysis
practical implementation
pubcrawl
Repudiation
resilience
Resiliency
Memory management
secure payment
Signal processing algorithms
Symmetric key algorithms
symmetric key cryptographic algorithms
Three-dimensional displays
Throughput
transactions
unauthorized people
decryption time
AES
avalanche effect
battery consumption
Blowfish
composability
Cryptography
customers requirement
datas security
Data Transmission
3DES
DES
ECB
encryption
encryption time
energy consumption
Human behavior
internet secure
Java
biblio
Link Reliable and Trust Aware RPL Routing Protocol for Internet of Things
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
Scalability
QoS
QoS guarantees
quality of service
resilience
Resiliency
Routing
Routing protocols
RPL
pubcrawl
security
standardized protocols
telecommunication security
Topology
trust model
Trust Routing
trust value computation
composability
processing resources
power consumption
network routing topology
multidimensional approach
memory usage
low-power lossy networks
link reliable-trust aware RPL routing protocol
IoT environment
IoT entities
IoT
Internet of Things
heterogeneous devices
Energy Efficiency
deployed devices
Computational modeling