Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
implementation
biblio
Cloud Agent-Based Encryption Mechanism (CAEM): A Security Framework Model for Improving Adoption, Implementation and Usage of Cloud Computing Technology
Submitted by grigby1 on Mon, 11/29/2021 - 12:33pm
adoption
CAEM Model
Cloud Computing
Computational modeling
Human Factors
implementation
Organizations
pubcrawl
Scalability
security
security improvement
Servers
Social Agents
Software as a service
biblio
Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability
Submitted by grigby1 on Tue, 10/08/2019 - 3:43pm
composability
group signature
implementation
Lattices
Metrics
Post-quantum
pubcrawl
quantum computing security
resilience
Resiliency
Scalability
zero-knowledge
biblio
On-chip Data Security Against Untrustworthy Software and Hardware IPs in Embedded Systems
Submitted by aekwall on Wed, 05/01/2019 - 11:42am
security of data
memory security
Metrics
microprocessor chips
on-chip memory blocks
pubcrawl
reconfigurable logic fabric
Resiliency
security
memory protection unit
security services
SoC FPGA
software IP
static detection methods
system-on-chip
third-party IP cores
third-party IPs
3PIP
memory protection design
memory access
low-latency hardware
IP networks
Intel DE1-SoC board
implementation
hierarchical top-down structure
Hardware
golden reference model
FPGA-based embedded systems
field programmable gate arrays
embedded systems
dual-core ARM processor
Cryptography
composability
biblio
Comparing Web Cache Implementations for Fast O(1) Updates Based on LRU, LFU and Score Gated Strategies
Submitted by grigby1 on Wed, 01/16/2019 - 1:37pm
runtime performance
hit rate
hypermedia
implementation
information technology
least frequently used (LFU)
least recently used (LRU)
least recently used replacement principle
LRU replacement principle
network optimization criteria
performance optimization
high user request workloads
score gated LRU
score gated polling
score gated polling (SGP)
Score Gated strategies
transport protocols
web cache implementations
Web cache strategies
web caching strategies
window LFU
cache storage
Computational modeling
pubcrawl
Metrics
Resiliency
Scalability
Complexity theory
simulation
Logic gates
Conferences
internet
data structures
microsoft windows
Windows
Web Caching
achieved hit rate performance
arbitrary score assessment
cache performance
fast O(1) updates
fast updating
biblio
Design of S-Boxes Defined with Cellular Automata Rules
Submitted by grigby1 on Wed, 04/11/2018 - 1:43pm
cellular automata
composability
Compositionality
genetic programming
implementation
lightweight cryptography
pubcrawl
S-boxes
theoretical cryptography
biblio
An IDE for the Design, Verification and Implementation of Security Protocols
Submitted by grigby1 on Wed, 01/10/2018 - 11:19am
intuitive language AnB
verification
tools
software engineering
security protocols
security of data
secure distributed applications
Resiliency
pubcrawl
Protocols
protocol verification
program verification
program compilers
model checker OFMC
Java
AnBx compiler
integrated development environment
implementation
Generators
formal verification
Formal Specification
formal modelling
formal method tools
encryption
Eclipse-based IDE
design
dependable distributed applications
composability
compiler security
code generator
biblio
\$\textbackslashtextbackslashLambda\$ο\$\textbackslashtextbackslashlambda\$: Functional Lattice Cryptography
Submitted by K_Hooper on Fri, 10/13/2017 - 9:29am
composability
Compositionality
Computing Theory
Computing Theory and Composabilty
Haskell
implementation
lattice-based cryptography
pubcrawl
ring-lwe
biblio
∑O\$\textbackslashphi\$Oς: Forward Secure Searchable Encryption
Submitted by grigby1 on Mon, 07/24/2017 - 12:59pm
audits
Compositionality
encryption
encryption audits
forward privacy
implementation
Metrics
provable security
pubcrawl
resilience
searchable symmetric encryption
biblio
The achieve of power manager application honey-pot based on sandbox
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
power manager application honey-pot
Sandboxing technology
sandbox
pubcrawl170114
power systems
power system simulation
power system security
power system management
power system
application layer simulation
power manager application
Power industry
Packaging
implementation
honeypot
Decision support systems
cyber-attack reduction
attack capture method
file
Advanced Microgrids—the State-of-the-Practice and Research Needs
Submitted by Tariq Samad on Mon, 02/17/2014 - 3:43pm. Contributors:
Tariq Samad
Datta Godbole
CPS Domains
Architectures
Energy
CPS Technologies
Foundations
decentralized
implementation
interoperability
island
microgrid
optimization
CFP Paper Submissions
CFP Submissions
2013 National Workshop on Energy Cyber-Physical Systems
2013
Industry
Position Paper
Publications