Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
resource management
biblio
Hardware Design of Gaussian Kernel Function for Non-Linear SVM Classification
Submitted by grigby1 on Wed, 07/13/2022 - 1:12pm
Support vector machines
pubcrawl
Resiliency
Conferences
Hardware
Classification algorithms
resource management
resilience
Scalability
Multiplexing
digital computers
exponentiation
biblio
A Network Architecture Containing Both Push and Pull Semantics
Submitted by grigby1 on Fri, 07/01/2022 - 1:18pm
clean slate
future network architecture
Human behavior
Identifier extension
IP networks
Metrics
Multi-Identifier Network
network architecture
policy governance
pubcrawl
Push and pull semantics
resilience
Resiliency
resource management
Routing
Semantics
biblio
Resource Allocation for Secrecy Rate Optimization in UAV-assisted Cognitive Radio Network
Submitted by grigby1 on Fri, 07/01/2022 - 10:22am
security
pubcrawl
resilience
sensors
resource management
simulation
cognitive radio
Cognitive Radio Security
Unmanned Aerial Vehicles
radio transmitters
Resiliency
artificial noise
Cognitive Radio Network
resource allocation
secrecy rate
unmanned aerial vehicle
biblio
Layered Security Multicast Algorithm based on Security Energy Efficiency Maximization in SCMA Networks
Submitted by aekwall on Fri, 07/01/2022 - 9:49am
codes
SCMA
OFDM
networks security energy efficiency
Multicast algorithms
layered security multicast
codebook assignment
channel coding
power allocation
simulation
Energy Efficiency
resource management
network security
composability
Resiliency
Metrics
pubcrawl
biblio
Adversarial Attacks on Deep Learning Based Power Allocation in a Massive MIMO Network
Submitted by aekwall on Fri, 07/01/2022 - 9:46am
deep learning
Perturbation methods
tools
Wireless communication
pubcrawl
Scalability
Resiliency
Artificial Neural Networks
resource management
wireless security
Neural networks
adversarial attacks
precoding
massive MIMO
power allocation
Chained Attacks
biblio
Configurable Butterfly Unit Architecture for NTT/INTT in Homomorphic Encryption
Submitted by grigby1 on Thu, 06/09/2022 - 2:44pm
pubcrawl
resilience
Resiliency
field programmable gate arrays
Hardware
Scalability
Cryptography
delays
Metrics
resource management
Homomorphic encryption
Transforms
Human Factors
butterfly unit
Number theoretic transform (NTT)
ring learning with error
biblio
Low-overhead Solutions For Preventing Information Leakage Due To Hardware Trojan Horses
Submitted by grigby1 on Thu, 05/19/2022 - 1:03pm
Trojan horses
trojan horse detection
Information Leakage
CRC
mac
Microprocessors
Cyclones
Hardware Trojans
resource management
encryption
Runtime
composability
Hardware
FPGA
Resiliency
resilience
pubcrawl
biblio
Secure Computation Offloading for Multi-user Multi-server MEC-enabled IoT
Submitted by grigby1 on Tue, 05/03/2022 - 3:57pm
Heuristic algorithms
Interference
Internet of Things
Iterative methods
predictability
pubcrawl
resilience
Resiliency
resource management
Scalability
Security Heuristics
simulation
Uplink
biblio
Light-Weight DDoS Mitigation at Network Edge with Limited Resources
Submitted by grigby1 on Wed, 04/13/2022 - 10:28am
Internet of Things
resource management
Resiliency
resilience
Queueing analysis
pubcrawl
performance evaluation
Metrics
Logic gates
Communication system security
Image edge detection
Human behavior
Floods
denial-of-service attack
DDoS attack mitigation
computer network management
Computer crime
composability
biblio
A NFV-based Resource Orchestration Algorithm for DDoS Mitigation in MEC
Submitted by grigby1 on Wed, 04/13/2022 - 10:27am
Metrics
Wireless communication
security
Resource Orchestration Game Theory
resource management
Resiliency
resilience
pubcrawl
Pricing
composability
MEC
Human behavior
Games
game theory
denial-of-service attack
ddos mitigation
DDoS attack mitigation
convex optimization
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »