Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secret data
biblio
MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding
Submitted by grigby1 on Mon, 01/25/2021 - 11:29am
Resiliency
invasive software
magnetic cover channel
Magnetic separation
Magnetometers
Metrics
prototype MagView
pubcrawl
resilience
information embedding
secret data
sensitive information
transmitter computer
video coding
video decoding
video encoding
video frame type
video quality degradation
CPU utilization
Air gaps
air-gap
air-gapped internal network
air-gapped networks
Central Processing Unit
composability
Computers
cover channels
covert channels
Decoding
distributed magnetic covert channel
encoding
error statistics
Human behavior
Human Factors
Image coding
biblio
E-Government Documents Authentication and Security by Utilizing Video Crypto-Steganography
Submitted by grigby1 on Fri, 10/16/2020 - 11:22am
Image color analysis
video crypto-steganography
video coding
Steganography
security
secret data
reversible data hiding
Resiliency
resilience
RDH
pubcrawl
policy-based governance
key security parameters
internet
image encryption scheme
authentication
encryption
Electronic government
e-government process
e-government documents authentication
E-Government
data hiding scheme
data hiding procedure
data encapsulation
Cybersecurity
Cryptography
cover image
Conferences
collaboration
biblio
Triple-Layer Image Security Using a Zigzag Embedding Pattern
Submitted by aekwall on Mon, 09/21/2020 - 3:36pm
normal cross correlation
cover image
cryptographic nature
high capacity
histogram analysis
image fidelity
least significant bit-embedding
LSB steganography
mean square error
message security scheme
chaotic logistic map encryption
peak signal to noise ratio
secure layer
steganographic nature
structural similarity index metric
triple-layer image security
zigzag
zigzag embedding pattern
zigzag pattern
Cross Layer Security
AES
encryption
security
Resiliency
pubcrawl
Logistics
Image color analysis
Measurement
image colour analysis
chaotic communication
Cryptography
mean square error methods
secret data
Steganography
secret message
composability
2D image steganography technique
AES-128 encryption
chaotic logistic map
biblio
Proposal of Equal-Weight (2, 2) Visual Secret Sharing Scheme on VN-CSK Illumination Light Communication
Submitted by aekwall on Mon, 07/13/2020 - 11:17am
Scalability
Modified Pseudo-Orthogonal M-sequence
occurence probability
optical transmitters
orthogonal codes
probability
pubcrawl
Receivers
Resiliency
Metrics
secret data
telecommunication security
variable N-parallel code-shift-keying system
Visual Light Communications Security
visual secret sharing scheme
VN-CSK illumination light communication
VN-CSK system
adjacent illumination light interference
m-sequences
lighting function
lighting
light signal
light emitting diodes
indoor visible light communication channel
illumination light overlapping area
free-space optical communication
error statistics
Distributed databases
dimming control problem
data communication
Cryptography
constant illuminance
bit error rate performance
biblio
A Multiple Layer Security Scheme Utilizing Information Matrices
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
secret data
word length 256 bit
secret message
multiple layer security scheme
least significant bit embedding
information matrix
information matrices
double-layer message security scheme
Steganography
Cryptography
AES algorithm
QR codes
cyber physical systems
matrix algebra
pubcrawl
Resiliency
telecommunication security
biblio
A Simultaneous Approach for Compression and Encryption Techniques Using Deoxyribonucleic Acid
Submitted by aekwall on Mon, 03/16/2020 - 10:42am
channel medium
time consumption
standard compression techniques
simultaneous technique
simultaneous compression
simultaneous approach
sequential technique
scientific concepts
DNA nucleotides
different scientific studies
deoxyribonucleic acid
creative skill
Compression
compacted information
compact form
Cryptography
secret data
Encryption technique
Scientific Computing Security
Compositionality
Predictive Metrics
resilience
Data Transmission
DNA
Image coding
data compression
pubcrawl
security
encryption
biblio
An Efficient Memory Zeroization Technique Under Side-Channel Attacks
Submitted by aekwall on Mon, 02/24/2020 - 10:55am
built-in self test
volatile memories
side-channel attacks
Side-channel attack
security violations
secured data content
secret data
random-access storage
private memory contents
on-chip memory contents
Memory Zeroization
memory security
memory built-in-self-test hardware
MBIST based content zeroization approach
efficient memory zeroization technique
content protection
security of data
Temperature sensors
cryptographic keys
remanence
Compositionality
Engines
Random access memory
data deletion
security attacks
pubcrawl
Resiliency
system-on-chip
security
Memory management
Hardware
Cryptography