Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computers
biblio
A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments
Submitted by aekwall on Fri, 02/25/2022 - 9:44am
privacy
performance evaluation
authentication
Protocols
pubcrawl
Resiliency
Internet of Things
Industries
Compositionality
Predictive Metrics
provable security
Elliptic curves
Computers
Bilinear Pairing
identity authentication
Key exchange
biblio
VM Migration Scheduling as Moving Target Defense against Memory DoS Attacks: An Empirical Study
Submitted by grigby1 on Tue, 02/22/2022 - 4:46pm
Benchmark testing
tools
machine learning
pubcrawl
Metrics
resilience
Resiliency
Scalability
Computers
Memory DoS
Virtual machining
moving target defense
denial of service
Systems architecture
VM migration
codes
Dynamic platform technique
biblio
Moving Target Defense for Space Systems
Submitted by grigby1 on Tue, 02/22/2022 - 4:46pm
MILSTD-1553
Protocols
Computers
real-time systems
Measurement
Cybersecurity
cyber resilience
moving target defense
military computing
intelligent system scrambling
Scalability
real-time network security
critical infrastructure
machine learning
pubcrawl
Metrics
resilience
Resiliency
Conferences
biblio
Relationship Anonymity Evaluation Model Based on Markov Chain
Submitted by grigby1 on Wed, 02/09/2022 - 1:46pm
markov chain
anonymity
Anonymous assessment
attack model
Communication networks
composability
Computational modeling
Computers
Human behavior
Resiliency
Markov processes
Metrics
Probabilistic logic
Probability distribution
pubcrawl
Receivers
Relationship anonymity
resilience
biblio
A Compact Full Hardware Implementation of PQC Algorithm NTRU
Submitted by grigby1 on Mon, 02/07/2022 - 3:47pm
composability
Microelectronics Security
Post Quantum Cryptography (PQC)
polynomial multiplication
NTRU
lattice-based
Microelectronics
Resists
public key cryptography
security
quantum computing
Computers
NIST
Hardware
Resiliency
resilience
Metrics
pubcrawl
biblio
A Method and System for Program Management of Security Chip Production
Submitted by grigby1 on Mon, 02/07/2022 - 3:43pm
Image Processing
Microelectronics Security
WebService
security chip
Program management
Production management
Production issues
Management system
Microelectronics
security
Systems architecture
composability
Computers
Conferences
Resiliency
resilience
Metrics
pubcrawl
biblio
Digital Signature Scheme over Lattices
Submitted by aekwall on Fri, 02/04/2022 - 9:32am
Receivers
Repudiation
Signing
digital signature
Computers
verification
key generation
Lattices
Forgery
Cryptography
composability
Human behavior
Resiliency
Metrics
pubcrawl
information technology
information security
biblio
Analysis of public-key cryptography using a 3-regular graph with a perfect dominating set
Submitted by aekwall on Mon, 01/31/2022 - 3:13pm
NP-hard problem
White Box Security
Resiliency
quantum computing
Pur
public-key cryptography
public key cryptography
pubcrawl
performance evaluation
perfect dominating set
white box cryptography
NP-complete
NIST
minus dominating function
encryption
Computers
3-regular graph
Metrics
resilience
composability
biblio
Research of Android APP based on dynamic and static analysis Sensitive behavior detection
Submitted by grigby1 on Tue, 01/25/2022 - 3:59pm
pubcrawl
resilience
Resiliency
Conferences
data privacy
telecommunication traffic
Computers
composability
Runtime
static analysis
Image Processing
Android app
automatic analysis
Dynamic and static detection
Automated Response Actions
biblio
Secured Health Data Access in Cloud Computing Using Multiple Attribute-Based Encryptions
Submitted by aekwall on Tue, 01/25/2022 - 2:52pm
Access Data
attribute-based encryption
CC
Cloud Computing
Computers
data access
encryption
Human behavior
policy-based governance
Protocols
pubcrawl
Scalability
Secure storage
security issues
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »