Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information security
biblio
Achieving Privacy and Security Using QR-Code through Homomorphic Encryption and Steganography
Submitted by aekwall on Thu, 07/14/2022 - 4:17pm
Homomorphic encryption
NTRU
DWT
QR codes
QR code
education
Focusing
Market research
cyber-physical systems
Cryptography
privacy
Resiliency
pubcrawl
Steganography
Online banking
data privacy
information security
security
biblio
A Pragmatic Analysis of Pre- and Post-Quantum Cyber Security Scenarios
Submitted by grigby1 on Thu, 07/14/2022 - 3:42pm
Pragmatics
quantum computing security
technologies
quantum
problems
Oppel-2
Oppel-1
impact
cyber
Cryptic
information security
Market research
Resistance
Qubit
quantum computing
Computer crime
Cryptography
Scalability
security
pubcrawl
biblio
Enhancing Continuous Service of Information Systems Based on Cyber Resilience
Submitted by grigby1 on Wed, 07/13/2022 - 1:17pm
information security
Trustworthy Systems
trust
Systems engineering and theory
security architecture
security
Scalability
Resiliency
resilience measurement
pubcrawl
policy governance
Metrics
Computing Theory
Human behavior
faces
data science
Cyberspace
cybersecurity education
cyber resilience
continuous service
Conferences
composability
collaboration
resilience
biblio
Information Protection of International Students Based on Network Security
Submitted by grigby1 on Wed, 07/13/2022 - 1:16pm
International Students in China
security management
Scalability
Resiliency
resilience
pubcrawl
process control
policy governance
network security
Metrics
collaboration
information security
information protection
Human behavior
education
data privacy
cybersecurity education
cyber security
composability
Companies
biblio
Sustainability and Time Complexity Estimation of Сryptographic Algorithms Main Operations on Elliptic Curves
Submitted by grigby1 on Wed, 07/13/2022 - 1:11pm
Time complexity
sustainability
Special Attacks
Order Of Elliptic Curve
Exponentiation Of Points
exponentiation
mathematical models
elliptic curve
Elliptic curves
information security
Scalability
Stability analysis
timing
resilience
Resistance
Resiliency
pubcrawl
biblio
Sharing Cyber Threat Intelligence and Collaboration
Submitted by grigby1 on Tue, 07/12/2022 - 3:24pm
malware
Zack Information Gap analysis
sharing of cyber threat information
product development
Cyber Threat Information
policy governance
information sharing
cryptology
Compositionality
Metrics
collaboration
composability
Ecosystems
Resiliency
resilience
pubcrawl
Organizations
machine learning
information security
biblio
Analysis of Encrypted Image Data with Deep Learning Models
Submitted by grigby1 on Tue, 07/12/2022 - 3:23pm
Analytical models
policy governance
cryptology
Knowledge Discovery
Compositionality
Loss measurement
Metrics
Data Security
composability
Cryptography
Resiliency
resilience
pubcrawl
Neural networks
information security
collaboration
Training
deep learning
biblio
McEliece Coding Method based on LDPC Code with Application to Physical Layer Security
Submitted by aekwall on Fri, 07/01/2022 - 9:47am
physical layer security
pubcrawl
Resiliency
composability
Metrics
channel coding
encoding
information security
LDPC
McEliece
parity check codes
Public key
secrecy code
simulation
Wireless communication
biblio
The Text Captcha Solver: A Convolutional Recurrent Neural Network-Based Approach
Submitted by grigby1 on Thu, 06/30/2022 - 1:19pm
deep learning
information security
pubcrawl
Human behavior
internet
composability
Recurrent neural networks
Image color analysis
noise reduction
captchas
CAPTCHA
character recognition
Connectionist Temporal Classification
Convolutional Recurrent neural network
Optical character recognition software
biblio
Analysis of information security in the PoW (Proof of Work) and PoS (Proof of Stake)blockchain protocols as an alternative for handling confidential nformation in the public finance ecuadorian sector
Submitted by grigby1 on Wed, 06/15/2022 - 10:57am
information security
blockchain
pubcrawl
Human behavior
Scalability
bitcoin
distributed ledger
protocol
legislation
PoS
PoW
Proof of Work
Public finance
bitcoin security
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »