Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Random access memory
biblio
Classification of Mobile Phone Price Dataset Using Machine Learning Algorithms
Submitted by grigby1 on Wed, 09/20/2023 - 2:06pm
feature extraction
machine learning
machine learning algorithms
Support vector machines
pubcrawl
resilience
Resiliency
batteries
privacy
composability
Mobile handsets
classification
Random access memory
computer science
price prediction
biblio
Security Support on Memory Controller for Heap Memory Safety
Submitted by grigby1 on Wed, 08/23/2023 - 3:35pm
pubcrawl
Safety
Scalability
privacy
metadata
Random access memory
statistical analysis
i-o systems security
Pollution
memory safety
Blacklisting Defense
electromagnetic compatibility
Memory Controller
memory corruption attacks
biblio
Real-Time FPGA Investigation of Interplay Between Probabilistic Shaping and Forward Error Correction
Submitted by grigby1 on Mon, 07/31/2023 - 4:48pm
pubcrawl
Metrics
resilience
field programmable gate arrays
composability
real-time systems
Table lookup
Probabilistic logic
Random access memory
forward error correction
parity check codes
Resiliency
optical fiber communication
field-programmable gate array
Distribution matching
probabilistic shaping
biblio
Sim-D: A SIMD Accelerator for Hard Real-Time Systems
Submitted by grigby1 on Thu, 04/27/2023 - 5:07pm
Computational modeling
policy governance
real-time and embedded systems
clean slate
Processor scheduling
Random access memory
parallel architectures
real-time systems
delays
computer architecture
Resiliency
resilience
Metrics
Human Factors
Human behavior
pubcrawl
collaboration
Schedules
biblio
Advanced Encryption Standard Algorithm with Optimal S-box and Automated Key Generation
Submitted by grigby1 on Fri, 03/31/2023 - 11:25am
delays
Throughput
Resiliency
resilience
Random access memory
Metrics
Lookup Table (LUT)
Heuristic algorithms
encryption
-AES
Data Security
Cryptography
computer architecture
Ciphertext
biometrics (access control)
pubcrawl
biometric encryption
biblio
A Design of Key Generation Unit Based on SRAM PUF
Submitted by grigby1 on Fri, 03/17/2023 - 11:35am
Data Security
key
random key generation
Resiliency
SRAM PUF
Reliability engineering
ECC
Random access memory
resilience
information security
Layout
real-time systems
Computational modeling
Scalability
Metrics
Human Factors
Human behavior
pubcrawl
biblio
Implementation and Performance Analysis of Lightweight Block Ciphers for IoT applications using the Contiki Operating system
Submitted by aekwall on Fri, 03/03/2023 - 10:59am
light emitting diodes
lightweight block ciphers
cooja
Contiki
Lightweight Ciphers
lightweight cryptography
Random access memory
cyber-physical systems
Sensor Systems
sensors
Telecommunications
Resiliency
Scalability
pubcrawl
operating systems
WSNs
wireless sensor networks
biblio
Correlation Power Analysis and Protected Implementation on Lightweight Block Cipher FESH
Submitted by aekwall on Fri, 03/03/2023 - 10:59am
Correlation
mask
lightweigth block cipher
FESH
correlation power analysis
Lightweight Ciphers
Side-channel attack
Power measurement
Costs
Resists
Random access memory
cyber-physical systems
Ciphers
Resiliency
Scalability
pubcrawl
Conferences
biblio
Evaluating the Performance of Lightweight Block Ciphers for Resource-Constrained IoT Devices
Submitted by aekwall on Fri, 03/03/2023 - 10:57am
Power demand
Lightweight Ciphers
Cipher
lightweight cryptography
Costs
Memory management
Arduino
Random access memory
cyber-physical systems
Internet of Things
Ciphers
Throughput
Resiliency
Scalability
pubcrawl
encryption
performance evaluation
biblio
Cybersecurity Modelling for SCADA Systems: A Case Study
Submitted by grigby1 on Fri, 02/17/2023 - 5:12pm
pubcrawl
resilience
Resiliency
Data models
Computational modeling
SCADA systems
maintenance engineering
Cybersecurity
Compositionality
Random access memory
Sensitivity
Internet security
SCADA Systems Security
attack and countermeasure trees
MTTSF
1
2
3
4
5
6
7
8
9
next ›
last »