Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Resistance
biblio
Physical Layer Security in Power Domain NOMA through Key Extraction
Submitted by aekwall on Thu, 12/01/2022 - 4:24pm
simulation
data privacy
Metrics
Resiliency
composability
Resistance
physical layer security
Data Security
spectral efficiency
NOMA
channel state information
Non-Orthogonal Multiple Access (NOMA)
superposition coding (SC)
biblio
Coverless Steganography Method based on the Source XML File Organization of OOXML Documents
Submitted by grigby1 on Thu, 10/20/2022 - 4:01pm
Organizations
pubcrawl
Metrics
Heuristic algorithms
privacy
composability
real-time systems
Receivers
Resistance
organization
Steganography
XML
compound tree
OOXML documents
search-based coverless steganography algorithms
steganography detection
biblio
Transient Security and Dependability Analysis of MEC Micro Datacenter under Attack
Submitted by grigby1 on Thu, 10/20/2022 - 3:37pm
simulation
Transient analysis
Stochastic Reward Nets
quantitative analysis
Multi-access Edge Computing
Resiliency
Stochastic Computing Security
markov chain
Random access memory
security
Numerical models
Resistance
Virtual machining
Scalability
resilience
pubcrawl
Servers
biblio
Development of a Set of Procedures for Providing Remote Access to a Corporate Computer Network by means of the SSH Protocol (Using the Example of the CISCO IOS Operating System)
Submitted by grigby1 on Fri, 09/30/2022 - 3:55pm
operating systems
corporate computer network remote control
Cisco
ios
iOS Security
Resiliency
SSH
emulation
Mobile communication
computer networks
security
Resistance
Compositionality
Protocols
Software
resilience
Metrics
Human Factors
pubcrawl
biblio
The Trust Evaluation and Anomaly Detection Model of Industrial Control Equipment Based on Multiservice and Multi-attribute
Submitted by grigby1 on Fri, 09/30/2022 - 8:44am
process control
vector similarity algorithm
support algorithm
multi-service
multi-attribute
Resiliency
ICS Anomaly Detection
Resists
trust model
Resistance
Support vector machines
ICs
Protocols
Data models
Scalability
Analytical models
resilience
pubcrawl
Anomaly Detection
biblio
Fuzzy Key Generator Design using ReRAM-Based Physically Unclonable Functions
Submitted by grigby1 on Tue, 09/20/2022 - 2:33pm
Sensitivity
Fuzzy Cryptography
ReRAM technology
physically unclonable functions
hardware-based authentication
fuzzy extractors
Resiliency
Physical Unclonable Function
Iron
pubcrawl
Bit error rate
Time factors
Resistance
IoT security
Cryptography
Scalability
resilience
Metrics
biblio
A Study of Post Quantum Cipher Suites for Key Exchange
Submitted by grigby1 on Fri, 09/16/2022 - 4:54pm
standardization
Supersingular Isogenies
Ring Learning With Errors (RLWE)
lattice cryptography
Key Pair Generation
Key exchange
Error Code Correcting
Cryptographic Benchmarking
Post Quantum Cryptography (PQC)
codes
Resiliency
security
Wires
forward error correction
digital signature
Resistance
composability
quantum computing
Computers
NIST
Metrics
pubcrawl
biblio
Towards a firmware TPM on RISC-V
Submitted by grigby1 on Thu, 08/04/2022 - 5:04pm
IoT security
trusted platform modules
Trusted Platform Module
processor
fTPM
edge security
Edge Processing
RISC-V
Trusted Computing
automotive security
security
Resistance
side-channel attacks
Program processors
composability
system-on-chip
Software
Resiliency
resilience
pubcrawl
biblio
Secure Real-time Data Access Using Two-Factor Authentication Scheme for the Internet of Drones
Submitted by grigby1 on Mon, 08/01/2022 - 2:45pm
pubcrawl
Human behavior
Human Factors
security
authentication
privacy
internet
real-time systems
Resistance
Propagation losses
two-factor authentication
two factor authentication
Costs
UAVs
Internet of drones
Real-time information
biblio
PKMark: A Robust Zero-distortion Blind Reversible Scheme for Watermarking Relational Databases
Submitted by grigby1 on Fri, 07/15/2022 - 12:43pm
Metrics
zero-distortion
robust
reversible
blind
relational database security
Relational Database
distortion
Watermarking
Resistance
Ciphers
Redundancy
composability
Conferences
Resiliency
resilience
Human behavior
pubcrawl
relational databases
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »