Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cuckoo search algorithm
biblio
Intrusion Detection and Prevention System Using Cuckoo Search Algorithm with ANN in Cloud Computing
Submitted by grigby1 on Wed, 09/08/2021 - 9:35am
Human behavior
Servers
Resiliency
resilience
pubcrawl
PDR (Packet Delivery Ratio)
Metrics
Intrusion Detection
IDS (Intrusion Detection System)
ANN (Artificial Neural Network)
Handheld computers
energy consumption
delays
DDoS Attack Prevention
cuckoo search algorithm
composability
Cloud Computing
Artificial Neural Networks
biblio
Optimization of Secret Key using cuckoo Search Algorithm for ensuring data integrity in TPA
Submitted by aekwall on Mon, 03/22/2021 - 1:07pm
optimization
TPA
third party auditors
secret key generation algorithms
Secret key
search problems
Resiliency
public key cryptography
pubcrawl
Predictive Metrics
auditing
encryption audits
encryption
decryption purpose
data integrity
cuckoo search algorithm
Cuckoo search
Compositionality
Cloud Computing
biblio
An Efficient and Reliable Routing Protocol Using Bio-Inspired Techniques for Congestion Control in WSN
Submitted by grigby1 on Wed, 12/02/2020 - 1:51pm
network performance
wireless sensor networks
Wireless Sensor Network
telecommunication congestion control
Scalability
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
pubcrawl
Packet loss
AODV protocol
network delay
delays
cuckoo search algorithm
coupled congestion control
congestion recognition
congestion problem
congestion free path
Congestion Control
congested resources
bioinspired techniques
artificial bee colony algorithm.
biblio
Improving Power amp; Latency Metrics for Hardware Trojan Detection During High Level Synthesis
Submitted by grigby1 on Mon, 12/10/2018 - 11:42am
Mathematical model
work factor metrics
Unroll Factor
Trojan horses
third party IP cores
Space exploration
semiconductor industry
secure IC design process
Scalability
resource allocation
Resiliency
resilience
pubcrawl
power metrics
power consumption
microprocessor chips
adders
latency metrics
invasive software
integrated circuits
integrated circuit design
integrated chip design
high level synthesis
hardware Trojan detection
hardware trojan
Hardware
design-for-trust techniques
design space exploration process
Design Space Exploration
datapath resource allocation
cuckoo search algorithm
Benchmark testing