Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computational modeling
biblio
Optimization of Encrypted Communication Model Based on Generative Adversarial Network
Submitted by grigby1 on Thu, 08/03/2023 - 1:10pm
Training
machine learning algorithms
pubcrawl
Metrics
resilience
Resiliency
Scalability
Computational modeling
Artificial Intelligence
Error analysis
Stability analysis
generative adversarial networks
Generative Adversarial Learning
Brain modeling
convolutional neural network
Plaintext leakage
biblio
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free
Submitted by grigby1 on Thu, 08/03/2023 - 12:56pm
encryption
pubcrawl
Metrics
resilience
Resiliency
Cryptography
Computational modeling
composability
Public key
Random variables
Noise measurement
black-box reductions
bounded leakage
dense leakage
leakage-resilient cryptography
Forward Error Encryption
biblio
Access Distribution to the Evaluation System Based on Fuzzy Logic
Submitted by grigby1 on Fri, 07/28/2023 - 2:33pm
information technology
mamdani fuzzy inference
fuzzy system
MATLAB
information protection
Fuzzy logic
computer security
real-time systems
information system
security
Computational modeling
Hardware
Software
Resiliency
resilience
Metrics
pubcrawl
biblio
Detection of Falsified Selfish Node with Optimized Trust Computation Model In Chimp -AODV Based WSN
Submitted by grigby1 on Fri, 07/21/2023 - 1:14pm
resilience
TCM
COA-EASRP
COA
false trust
energy measurement
Resiliency
AODV
Routing protocols
WSN
Adaptation models
Routing
wireless sensor networks
Computational modeling
Scalability
collaboration
policy-based governance
pubcrawl
security
biblio
A Novel and Secure Framework to Detect Unauthorized Access to an Optical Fog-Cloud Computing Network
Submitted by grigby1 on Fri, 07/21/2023 - 12:49pm
Fog computing
sustainable virtualization
Optical computing
and adaptable Honeypot
Resiliency
Passive Optical Network
Hidden Markov models
Markov model
Markov processes
Adaptation models
Image edge detection
intrusion detection system
Computational modeling
Scalability
resilience
pubcrawl
security
Cloud Computing
biblio
Design of Information Management System for Students' Innovation Activities Based on B/S Architecture
Submitted by grigby1 on Wed, 07/19/2023 - 2:41pm
computer architecture
pubcrawl
resilience
Computational modeling
Computers
information management
Compositionality
Systematics
Technological innovation
education
authentication technology
Resiliency
B/S architecture
information management system
JSP
expandability
biblio
Analysis of Elliptic Curve Cryptography with AES for Protecting Data in Cloud with improved Time efficiency
Submitted by grigby1 on Fri, 07/14/2023 - 2:17pm
encryption
pubcrawl
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
standards
Cloud Computing
Elliptic curve cryptography
advanced encryption standard
decryption
Novel Data Security
Time
biblio
Privacy preserving Data security model for Cloud Computing Technology
Submitted by grigby1 on Fri, 07/14/2023 - 9:48am
data privacy
encryption audits
hybrid modeling
Cloud Auditing
Resiliency
Compositionality
privacy preserving
Data Security
Computers
Computational modeling
Cryptography
privacy
Data models
resilience
Metrics
pubcrawl
machine learning algorithms
machine learning
Cloud Computing
biblio
An Efficient Key Generation Scheme for Secure Sharing of Patients Health Records using Attribute Based Encryption
Submitted by grigby1 on Thu, 07/13/2023 - 11:48am
Manuals
personal health record
efficient encryption
Key Distribution
key generation
public key cryptosystems
attribute-based encryption
Scalability
simulation
encryption
composability
Computational modeling
Medical services
Resiliency
resilience
pubcrawl
Cloud Computing
biblio
Implementation of Efficient Hybrid Encryption Technique
Submitted by grigby1 on Thu, 07/13/2023 - 11:46am
composability
Asymmetric Encryption
efficient encryption
ECDH
symmetric encryption
Elliptic curves
ECC
Multimedia systems
Elliptic curve cryptography
encryption
Computational modeling
Protocols
authentication
AES
Resiliency
resilience
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »