Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ubiquitous computing
biblio
Malware Detection Approach Based on the Swarm-Based Behavioural Analysis over API Calling Sequence
Submitted by grigby1 on Mon, 09/18/2023 - 4:35pm
dynamic analysis
word embedding
API calling sequence
Ant Colony
Resiliency Coordinator
Behavioral sciences
ubiquitous computing
computer viruses
Malware Analysis
graph theory
machine learning
malware
Databases
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Organizations
biblio
3CL-Net: A Four-in-One Networking Paradigm for 6G System
Submitted by grigby1 on Fri, 08/25/2023 - 10:59am
computer architecture
security
pubcrawl
resilience
Resiliency
Scalability
Wireless communication
Prototypes
Information Centric Networks
information-centric networking
6G mobile communication
ubiquitous computing
3CL-Net
3CL-Net based prototype
6G system
networking paradigm
biblio
Recommendation-based Security Model for Ubiquitous system using Deep learning Technique
Submitted by grigby1 on Fri, 03/17/2023 - 12:11pm
Recommendation-based
Unfair recommendation
ubiquitous computing
Trust models
Sensitivity
Scalability
Resiliency
resilience
recommender systems
collaboration
pubcrawl
Human Factors
Human behavior
feature extraction
deep learning
control systems
Computational modeling
biblio
Performance Comparison of AODV and DSDV In Vehicular Ad Hoc Networks
Submitted by grigby1 on Fri, 12/09/2022 - 6:28pm
pubcrawl
Metrics
resilience
Resiliency
composability
VANET
Reliability
vehicular ad hoc networks
Routing protocols
AODV
MANET
mobile computing
ubiquitous computing
DSDV
OMNET++
Ad Hoc Network Security
biblio
An Adaptive Edge-Based Steganography Algorithm for Hiding Text into Images
Submitted by grigby1 on Thu, 10/20/2022 - 3:59pm
Media
steganography detection
statistical attacks
Color Channel
edge detection
ubiquitous computing
steganalysis
filtering algorithms
Steganography
cyber security
Image edge detection
visualization
Streaming media
composability
privacy
Metrics
pubcrawl
biblio
Comparative study for Stylometric analysis techniques for authorship attribution
Submitted by grigby1 on Fri, 09/09/2022 - 2:29pm
machine learning
Support vector machines
pubcrawl
Human behavior
Metrics
deep learning
Measurement
Syntactics
authorship attribution
stylometry
text categorization
text classification
NLP
Data preprocessing
ubiquitous computing
Constituent Analysis.
biblio
Modification and Performance Improvement of Paillier Homomorphic Cryptosystem
Submitted by grigby1 on Tue, 05/10/2022 - 12:55pm
key generation
ubiquitous computing
Scalability
Resiliency
resilience
pubcrawl
paillier cryptosystem
Metrics
mathematical analysis
Big Data
information security
Human Factors
Homomorphic encryption
data privacy
Cryptography
Conferences
cloud computing security
big data security
biblio
A Cloud-Based Trust Computing Model for the Social Internet of Things
Submitted by grigby1 on Tue, 05/10/2022 - 12:55pm
Cloud Computing
Cloud-based Trust Computing
Computational modeling
data privacy
Economics
Human Factors
machine learning
Metrics
Mobile Applications
pubcrawl
resilience
Resiliency
Scalability
Social loT
ubiquitous computing
biblio
Lightweight Grouping-Proof for Post-Quantum RFID Security
Submitted by grigby1 on Tue, 05/10/2022 - 12:54pm
smart cities
Passive RFID tags
LPN
grouping-proof
ubiquitous computing
Lightweight
Resists
Human Factors
Technological innovation
pubcrawl
Robustness
quantum computing
Protocols
Scalability
performance evaluation
Resiliency
resilience
Metrics
biblio
Securing Remote Policy Enforcement by a Multi-Enclave based Attestation Architecture
Submitted by grigby1 on Tue, 05/10/2022 - 12:54pm
pubcrawl
ubiquitous computing
trusted execution environments
Trusted Computing
secure enclaves
Scalability
Resiliency
resilience
remote policy enforcement
Remote Attestation
Access Control
process control
Metrics
Intel SGX
Human Factors
Confidential computing
Conferences
computer architecture
codes
automatic enclave generation
1
2
3
4
5
6
7
8
next ›
last »