Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Robustness
biblio
Dynamic Iris-Based Key Generation Scheme during Iris Authentication Process
Submitted by grigby1 on Fri, 03/17/2023 - 11:34am
Robustness
key generation
encryption system
Dynamic Key
random key generation
Resiliency
Iris
biometrics
randomness
Image color analysis
Mathematics
encryption
resilience
NIST
authentication
Scalability
Metrics
Human Factors
Human behavior
pubcrawl
Cloud Computing
biblio
A Novel Secure Physical Layer Key Generation Method in Connected and Autonomous Vehicles (CAVs)
Submitted by grigby1 on Fri, 03/17/2023 - 11:34am
Robustness
pre-shared key
CAVs
random key generation
Resiliency
Phase shift keying
connected vehicles
Bit error rate
Physical layer
fading channels
security
resilience
VANETs
real-time systems
Cryptography
Scalability
Metrics
Human Factors
Human behavior
pubcrawl
biblio
Improving Robustness Verification of Neural Networks with General Activation Functions via Branching and Optimization
Submitted by grigby1 on Fri, 02/17/2023 - 5:17pm
pubcrawl
Metrics
resilience
Resiliency
optimization
Scalability
Compositionality
Robustness
Artificial Neural Networks
Biological neural networks
Neurons
scalable verification
biblio
System on Chip (SoC) Security Architecture Framework for Isolated Domains Against Threats
Submitted by grigby1 on Fri, 02/17/2023 - 5:10pm
secure system
SoC
isolated domains
arm
policy governance
sandboxing
Embedded System
threats
embedded systems
Robustness
computer architecture
side-channel attacks
composability
system-on-chip
Safety
security
Hardware
pubcrawl
collaboration
biblio
DIP Learning on CAS-Lock: Using Distinguishing Input Patterns for Attacking Logic Locking
Submitted by grigby1 on Fri, 02/03/2023 - 5:08pm
Logic gates
pubcrawl
Human behavior
resilience
Resiliency
Scalability
integrated circuits
Complexity theory
Robustness
supply chains
Globalization
logic locking
pattern locks
Manufacturing industries
CAS-Lock
DIP-driven attack
biblio
A Spoofing Proof Stateless Session Architecture
Submitted by grigby1 on Fri, 02/03/2023 - 3:51pm
Data models
sessions
SQL injection detection
database
cookies
SQL injection
Robustness
Databases
Protocols
privacy
security
authentication
Analytical models
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
biblio
Vulnerability analysis of Cyber-physical power system based on Analytic Hierarchy Process
Submitted by grigby1 on Fri, 02/03/2023 - 3:40pm
pubcrawl
Metrics
resilience
Resiliency
Conferences
Indexes
information technology
Vulnerability
composability
Robustness
simulation
Couplings
power systems
cyber-physical power system
power grid vulnerability analysis
Comprehensive criticality
biblio
Stealthy Attack Detection for Privacy-preserving Real-time Pricing in Smart Grids
Submitted by grigby1 on Fri, 01/20/2023 - 3:45pm
smart grid consumer privacy
Attack detection
collaboration
demand side management
differential privacy
Policy Based Governance
Pricing
privacy
pubcrawl
real-time pricing
real-time systems
Robustness
Smart Grid
uncertainty
biblio
When Does Backdoor Attack Succeed in Image Reconstruction? A Study of Heuristics vs. Bi-Level Solution
Submitted by grigby1 on Fri, 01/13/2023 - 1:28pm
signal processing
security
pubcrawl
resilience
Resiliency
Conferences
Scalability
Task Analysis
Robustness
Acoustics
speech processing
Security Heuristics
data poisoning
Backdoor Attacks
Bilevel Optimization
Image reconstruction
biblio
Design of an Advance Intrusion Detection System for IoT Networks
Submitted by aekwall on Thu, 01/05/2023 - 5:08pm
Robustness
Support vector machines
Computational modeling
Intrusion Detection
machine learning
pubcrawl
composability
Compositionality
Classification algorithms
intrusion detection system
IoT security
Biological system modeling
Linear programming
Swarm Intelligence
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »