Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer science
biblio
Post quantum hash based digital signatures comparative analysis. Features of their implementation and using in public key infrastructure
Submitted by grigby1 on Fri, 09/28/2018 - 3:12pm
Public key
XMSS algorithm implementation
XMSS algorithm
Ukrainian hash function national standard
Telecommunications
system analysis and design
SPHINCS algorithm
Scalability
resilience
Quantum-safe digital signatures
public key infrastructure
public key cryptography
computer science
pubcrawl
post quantum hash based digital signatures
post quantum cryptography
perspective digital signatures algorithms
Merkle algorithm
Leighton-Micali algorithm
hash functions analysis
Hash based digital signatures
digital signatures
cybernetics
biblio
A Hierarchical Game Framework for Data Privacy Preservation in Context-Aware IoT Applications
Submitted by grigby1 on Wed, 09/05/2018 - 10:38am
Numerical models
user-defender-attacker game
two-player model
two-player game model
two-layer three-player game framework
service provider
secure privacy-preserving protocols
Scalability
Resiliency
resilience
pubcrawl
private information
privacy
computer science
Internet of Things
human factor
Human behavior
hierarchical game framework
Games
game theory
data privacy preservation
data privacy
Data models
context-aware IoT applications
context-aware Internet
Computing Theory
biblio
Using k-nearest neighbor method to identify poison message failure
Submitted by grigby1 on Fri, 07/06/2018 - 2:06pm
pubcrawl
unstable network
Toxicology
Telephony
telecommunications networks
telecommunication security
telecommunication network reliability
telecommunication network management
telecommunication computing
System testing
statistical distributions
Scalability
Routing
Resiliency
resilience
AI Poisoning
Protocols
Probability distribution
probabilistic k-nearest neighbor method
poison message failure identification
network fault management
machine learning
learning (artificial intelligence)
Large-scale systems
IP networks
Human behavior
Data mining
control systems
computer science
Computer bugs
biblio
Mobile powered sub-group detection/formation using taste-based collaborative filtering technique
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
pubcrawl
wikipedia discussions
unsupervised approach
Taste-based Similarity MANET
taste-based group
taste-based collaborative filtering technique
sub-group detection performance
Social networking sites
social networking (online)
Social network services
Social Mediadata
social media discussion data
sensors
Resiliency
resilience
Collabarative Filtering
privacy
p2p
Mobile powered sub-group detection/formation
mobile computing
Mobile communication
Metrics
MANET
implicit attitude
Global Positioning System
explicit attitude
debate discussion forum
computer science
Compositionality
collaborative filtering
biblio
PKI Mesh Trust Model Based on Trusted Computing
Submitted by grigby1 on Wed, 05/30/2018 - 3:54pm
Metrics
Trusted Platform Module
Trusted Computing
trust model
Scalability
Robustness
Resiliency
public-key infrastructure
public key infrastructure
public key cryptography
Public key
pubcrawl
PKI Trust Models
PKI mesh trust model
authentication
Mesh networks
Human Factors
Human behavior
Electric breakdown
computer security
computer science
computational complexity
certification path processing
certification authorities
certification
certificate path processing
Bridges
biblio
Dynamic Mobile Charger Scheduling in Heterogeneous Wireless Sensor Networks
Submitted by el_wehby on Fri, 05/25/2018 - 3:48pm
computer science
Mobile communication
mobile computing
Robot sensing systems
Schedules
Scheduling algorithms
wireless sensor networks
1536086
biblio
Digital signature using MAC address based AES-128 and SHA-2 256-bit
Submitted by grigby1 on Wed, 05/16/2018 - 1:48pm
MAC address
word length 256 bit
telecommunication security
standards
SHA-2 256 bit
Seminars
secure hash algorithm
Resiliency
resilience
Repudiation
pubcrawl
Metrics
advanced encryption standard
human factor
Human behavior
encryption
digital signatures
digital signature
digital messaging
Cryptography
computer science
composability
AES-128
biblio
Synthesis of Hardware Sandboxes for Trojan Mitigation in Systems on Chip
Submitted by grigby1 on Wed, 05/09/2018 - 2:54pm
security
nontrusted IP
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
property specification language SERE
pubcrawl
run-time verification techniques
sandboxed layouts
sandboxing
IP security
sequential extended regular expressions
SoC
system-on-chip
Trojan horses
Trojan mitigation
trusted system-on-chips
virtualized controllers
virtualized resources
composability
automata theory
automatic generation
behavioral checkers
behavioral properties
CAPSL
collaboration
component authentication process
components off the shelf
automata
computer science
Computers
COTS
design flow
Hardware
hardware sandboxes
interface automata
invasive software
biblio
A Support Vector Machine Based Approach for Code Smell Detection
Submitted by grigby1 on Tue, 05/01/2018 - 11:38am
resilience
Training
SVMCSD
Support vector machines
support vector machine
Software systems
software quality
software metrics
software maintenance
software developers
Resiliency
Anti-patterns
public domain software
pubcrawl
Metrics
Measurement
learning (artificial intelligence)
DETEX
computer science
composability
code smells
code smell detection
biblio
On Sequential Selection of Attributes to Be Discretized for Authorship Attribution
Submitted by grigby1 on Mon, 03/19/2018 - 1:38pm
Indexes
Training
stylometry
sequential selection
pubcrawl
pattern classification
naïve Bayes classifier
Naive Bayes
Metrics
merging
authorship attribution
Human behavior
forward sequential selection
Entropy
Electronic mail
discretization
data mining techniques
Data mining
computer science
Bayes methods
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
next ›
last »