Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
performance evaluation
biblio
Information Hiding for Text Files by Adopting the Genetic Algorithm and DNA Coding
Submitted by aekwall on Mon, 02/08/2021 - 12:51pm
mean square error
World Wide Web
transposition cipher method
text file
text encryption
text encoding
SNR
single to noise ratio
Resiliency
pubcrawl
PSNR
privacy
Predictive Metrics
performance evaluation
peak single to noise
MSE
Cryptography
Information hiding
image visual quality
image retrieval
Image Processing
Image coding
Human behavior
hidden data mechanism
genetic algorithms
genetic algorithm
encryption
DNA encoding
DNA cryptography
DNA coding
DNA
digital media
biblio
Acoustic Fingerprints for Access Management in Ad-Hoc Sensor Networks
Submitted by grigby1 on Wed, 01/20/2021 - 3:07pm
Robustness
microphones
multiple devices
performance evaluation
pubcrawl
resilience
Resiliency
robust generation
robust pairing
intuitive interaction
speech processing
unauthorized devices
user interfaces
users
voice communication
Voice User Interface
voice user interfaces
wireless sensor networks
audio quality
Acoustic Fingerprints
acoustic scenery
Acoustic signal processing
Acoustics
Ad hoc networks
ad-hoc sensor networks
audio fingerprint
Audio fingerprinting
access management system
audio signal processing
authentication
composability
context based authentication
Cryptography
distributed voice user interface
fuzzy cryptography yields
Human behavior
biblio
Secure Wipe Out in BYOD Environment
Submitted by aekwall on Mon, 01/11/2021 - 12:30pm
Scalability
encryption
Hardware
performance evaluation
real-time systems
pubcrawl
tools
privacy
Standards organizations
computer science
BYOD
cryptographic erasure
deletion
Memory Forensics
Per-file deletion
data deletion
biblio
Performance Evaluation of DSR Protocol in MANET Untrustworthy Environment
Submitted by grigby1 on Mon, 12/28/2020 - 12:02pm
mobile ad hoc networks
untrue nodes
Throughput
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
pernicious hubs
performance evaluation
network security
network attacks
ad hoc network
mobile ad hoc network
Metrics
MANET untrustworthy environment
genuine setting
Dynamic Source Routing (DSR)
DSR protocol
DSR convention
directing convention
Compositionality
Adhoc network
ad hoc systems
biblio
BIAS: Bluetooth Impersonation AttackS
Submitted by grigby1 on Mon, 12/28/2020 - 11:27am
attacks
wireless communication pervasive technology
slave impersonation attacks
secure connection establishment
secure authentication procedure
mandatory mutual authentication
impersonation
Bluetooth version
Bluetooth standard
Bluetooth Impersonation AttackS
Bluetooth devices
Bluetooth chips
BIAS attacks
authentication procedure
bluetooth security
wireless security
authorisation
mobile radio
ubiquitous computing
composability
standards
Protocols
Cryptography
authentication
performance evaluation
telecommunication security
Resiliency
resilience
Human behavior
pubcrawl
Bluetooth
biblio
IoT Object Security towards the Sybil Attack Using the Trustworthiness Management
Submitted by aekwall on Mon, 12/14/2020 - 11:41am
Resiliency
trustworthiness management
trust value
Topology
time 9.3287 s
time 18.1029 s
sybil attacks
Sybil attack
Servers
sensors
security of data
security attacks
trustworthiness
physical object
performance evaluation
Metrics
IoT object security
intruder object
Internet of Things
electronic data interchange
data exchange
authentication
composability
pubcrawl
biblio
Secure Real-Time Heterogeneous IoT Data Management System
Submitted by aekwall on Mon, 12/07/2020 - 11:25am
secure platform
neural style transfer
on-device computing
performance evaluation
Predictive Metrics
pubcrawl
real-time data collection
real-time data processing system
Real-time monitoring
real-time systems
Resiliency
Scalability
machine learning
secure real-time heterogeneous IoT data management
secure systems
security
sensitive data
Software
streaming IoT data
surveillance
time data analytics system
Trusted Execution Environment
trusted platform modules
drones
cloud
Cloud Computing
composability
Cryptography
cyber-physical system security
data analysis
data privacy
Data Security
diverse IoT devices
drone-based data
authorisation
edge computing
edge device
embedded devices
end-to-end data encryption mechanism
heterogeneous data
Internet of Things
IoT
IoT devices
IOT edge computing
large-scale data analytics
biblio
Remote Monitoring and Online Testing of Machine Tools for Fault Diagnosis and Maintenance Using MTComm in a Cyber-Physical Manufacturing Cloud
Submitted by grigby1 on Tue, 12/01/2020 - 3:35pm
prognosis
maintenance engineering
manufacturers
manufacturing
manufacturing operations
Metrics
MTComm
performance evaluation
Policy Based Governance
Probes
product quality
product quality prediction
production engineering computing
maintenance
pubcrawl
remote monitoring
remote online testing
resilience
Resiliency
RESTful Web services
Scalability
Servers
testing
testing operations
web services
cyber-physical systems
cloud applications
Cloud based fault diagnosis
Cloud Computing
collaboration
component level
composability
condition monitoring
Conferences
CPMC
cyber physical manufacturing cloud
cyber-physical manufacturing cloud
Anomaly Detection
factory floor data
fault diagnosis
fault diagnosis system
heterogeneous machine tools
Human behavior
Human Factors
Internet scale communication method
Internet-scale Computing Security
machine health monitoring
machine tool communication
machine tools
biblio
A Method for Performance Optimization of Virtual Network I/O Based on DPDK-SRIOV*
Submitted by grigby1 on Mon, 11/02/2020 - 10:40am
optimization
virtualized network
Virtualization
virtualisation
virtual network security tester
virtual network
virtual machines
Throughput
Switches
SRIOV technology
security of data
Scalability
pubcrawl
physical network card
performance optimization
performance evaluation
cyber security
optimisation
network security testing devices
Kernel
input-output programs
I/O throughput performance
i/o systems security
I/O requirement
i-o systems security
high-performance network
Hardware
general hardware platform
DPDK-SRIOV.
DPDK-SRIOV
data plane development kit
biblio
Improving MPI Collective I/O for High Volume Non-Contiguous Requests With Intra-Node Aggregation
Submitted by grigby1 on Fri, 10/30/2020 - 11:19am
MPI collective I/O
Writing
two-phase I/O
security
Scalability
request redistribution
pubcrawl
Program processors
Production
performance evaluation
parallel processing
parallel jobs
Parallel I/O
non-contiguous I/O
MPI processes
Aggregates
message passing
Libraries
intranode aggregation
internode communication contention
Intel KNL
input-output programs
i-o systems security
I-O Systems
high volume noncontiguous requests
Haswell processors
Cray XC40 parallel computers
collective MPI-IO functions
Benchmark testing
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
…
next ›
last »