Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
Overhead Analysis of the Use of Digital Signature in MQTT Protocol for Constrained Device in the Internet of Things System
Submitted by aekwall on Mon, 02/08/2021 - 1:47pm
decryption time
Message Queue Telemetry Transport protocol
digital signature mechanism
memory usage
class-2 device
class-l device
constrained device
constrained-device
constrained-devices
MQTT protocol
flash usage
Internet of Things system
message delivery time
Message Queue Telemetry Transport
overhead analysis
signature verification performance
transmission process
computer network security
queueing theory
security mechanism
Payloads
digital signatures
pubcrawl
Resiliency
transport protocols
Protocols
Cryptographic Protocols
security
Memory management
Internet of Things
encryption
digital signature
Scalability
biblio
Industrial and Home Automation, Control, Safety and Security System using Bolt IoT Platform
Submitted by grigby1 on Wed, 02/03/2021 - 12:56pm
home computing
industrial automation
Temperature sensors
home automation
Internet of Things (IoT)
Pins
alert sub-system
Bolt IoT platform
cloud connectivity
Fasteners
Safety
Local Area Network (LAN)
machine-learning
safety systems
security subsystem
SMS
Temperature control
temperature data
temperature monitoring
security system
learning (artificial intelligence)
security of data
Cloud Computing
security
machine learning
pubcrawl
resilience
Resiliency
Internet of Things
Scalability
industrial control
control engineering computing
Industries
integrated circuits
Industrial Control Systems
production engineering computing
sensors
biblio
An Approach to Embedding a Style Transfer Model into a Mobile APP
Submitted by aekwall on Mon, 02/01/2021 - 11:44am
pre-trained convolutional neural network model
Economic indicators
mobile users
deep learning models
neural style transfer
Mobile app
embedding CNN models
Perceptual Losses algorithm
photo processing apps
Feedforward neural networks
proceeding time
shorten waiting time
Style transfer model
TensorFlow Mobile library
time 2.0 s
time 2.8 s
traditional style transfer model
Scalability
feedforward neural network
image restoration
Predictive Metrics
feedforward neural nets
software libraries
mobile phone
convolutional neural nets
testing
machine learning
pubcrawl
Resiliency
learning (artificial intelligence)
mobile computing
Internet of Things
Big Data
biblio
Neural Style Transfer for Picture with Gradient Gram Matrix Description
Submitted by aekwall on Mon, 02/01/2021 - 11:42am
neural style transfer
texture style
texture expression
texture details
stylized pictures
style loss
picture stylize
output stylized picture
muddiness
gradient gram matrix description
Gradient Gram matrix
Gradient Gram description
art style transfer
Scalability
Electrical Engineering
image texture
US Department of Defense
Predictive Metrics
Image reconstruction
automation
matrix algebra
pubcrawl
Resiliency
Runtime
Internet of Things
biblio
A Blockchain-based Method for Decentralizing the ACME Protocol to Enhance Trust in PKI
Submitted by aekwall on Mon, 02/01/2021 - 11:40am
Public key
digital trust
ethereum
Ethereum blockchain
human interaction
human trust
Internet of Things
PKI model
Protocols
pubcrawl
digital certificates
public key cryptography
public key infrastructure
Public Key Infrastructure model
Servers
trust
trust concerns
trust enhancement
trusted Certificate Authority
automation issue
Resiliency
Scalability
Human behavior
Metrics
ACME
ACME protocol
authorisation
Automated Certificate Management Environment
PKI Trust Models
blockchain
blockchain technology
certificate authority
certificate issuance automation protocol
certification
contracts
conventional security models
current trust issues
biblio
Privacy Preserving Data Aggregation in Fog Computing using Homomorphic Encryption: An Analysis
Submitted by aekwall on Mon, 02/01/2021 - 11:34am
authenticity
privacy preserving data aggregation
mobility awareness
location related awareness
Io
homomorphic encryption algorithms
Cloud Securit
fog node
Homomorphic encryption
cloud environment
Fog computing
Human Factors
cloud services
Cloud Computing
False Data Injection
Metrics
privacy
pubcrawl
Resiliency
data integrity
IoT devices
Internet of Things
data privacy
Cryptography
Scalability
biblio
Differential Privacy Information Publishing Algorithm based on Cluster Anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 2:01pm
differential privacy information publishing algorithm
Running efficiency
Resiliency
resilience
Publishing
pubcrawl
privacy budget
pattern clustering
Metrics
internet technology
Internet of Things
internet
information loss
Human behavior
anonymity
differential privacy
data privacy
composability
Complexity theory
complex background knowledge
clustering anonymity
Clustering algorithms
clustering
cluster anonymity
Big Data
background attack
Artificial Intelligence
anonymous
biblio
A service-oriented adaptive anonymity algorithm
Submitted by grigby1 on Thu, 01/28/2021 - 1:59pm
quasiidentifier attributes
Metrics
Partitioning algorithms
privacy
privacy preservation
privacy-preserving data publishing
pubcrawl
Publishing
Quasi-identifier Attributes
K-anonymity algorithms
released data
resilience
Resiliency
sensitive attributes
service-oriented adaptive anonymity algorithm
service-oriented architecture
splitting value
Adaptation models
k-anonymity
Internet of Things
Human behavior
distribution characteristics
dispersion
data privacy
data handling
contribution value differences
composability
attribute values distribution
attribute value distribution
anonymous results
anonymized data
anonymity group partition process
anonymity
biblio
A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks
Submitted by aekwall on Mon, 01/25/2021 - 1:03pm
atomic-level vulnerabilities
formal verification
Internet of Things systems
SCADA networks
networked system
cyber-physical systems security
attack graphs
A2G2V algorithm
architecture description tool
Predictive Metrics
attack graph
automatic attack graph generation
control networks
Cyber-Physical Systems (CPS)
enumerating counterexamples
model-checking tools
model-checking-based automated attack graph generator and visualizer
visualization tool
composability
computer network security
Internet of Things
Internet of Things (IoT)
computer architecture
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
security
graph theory
Computational modeling
tools
computer networks
model checking
data visualisation
visualization
biblio
Analysis of Rabin-P and RSA-OAEP Encryption Scheme on Microprocessor Platform
Submitted by aekwall on Mon, 01/25/2021 - 12:57pm
microprocessor chips
RSA-OAEP encryption scheme
RSA-OAEP cryptosystem
Rivest-Shamir-Adleman (RSA)
Raspbian OS
Raspbian
Raspberry Pi setup
Raspberry Pi
Rabin-P encryption scheme
Rabin-p cryptosystem
Rabin-p
public key cryptography
pubcrawl
Optimal Asymmetric Encryption Padding (OAEP)
microprocessor platform
exponentiation
Metrics
Linux operating system
Linux
Internet of Things structure
Internet of Things
Human behavior
energy consumption
encryption
embedded devices
decryption process
composability
Asymmetric Encryption
Scalability
Resiliency
« first
‹ previous
…
39
40
41
42
43
44
45
46
47
…
next ›
last »