Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Resistance
biblio
Convolutional Compaction-Based MRAM Fault Diagnosis
Submitted by aekwall on Tue, 03/08/2022 - 2:39pm
fault diagnosis
Human Factors
pubcrawl
Metrics
Resiliency
cyber-physical systems
Resistance
Systematics
Torque
STT-MRAM
Random access memory
multiple fault diagnosis
built-in self-test
convolutional compaction
DfT
memory built-in self-test
MRAM
Ports (Computers)
biblio
Security Enhancement of Forensic Evidences Using Blockchain
Submitted by aekwall on Fri, 02/25/2022 - 10:47am
Human behavior
smart contracts
security
Resistance
Resiliency
Reliability
pubcrawl
Provenance
law enforcement
information security
Tamper resistance
Forensics
forensic evidence
ethereum
composability
blockchain technology
blockchain
Human Factors
Metrics
Scalability
biblio
On Preventing SAT Attack with Decoy Key-Inputs
Submitted by aekwall on Fri, 02/25/2022 - 10:44am
logic locking
Very large scale integration
Switches
supply chains
SAT attack
Resistance
Resiliency
pubcrawl
provable security
Predictive Metrics
overproduction
Tamper resistance
ip protection
intellectual property
Hardware Security
design-for-trust
control systems
computer architecture
Compositionality
Human Factors
Metrics
Scalability
biblio
Secure Key Management Scheme With Good Resiliency For Hierarchical Network Using Combinatorial Theory
Submitted by aekwall on Fri, 02/04/2022 - 10:36am
wireless sensor networks
Base stations
Wireless communication
pubcrawl
Routing protocols
Resistance
Buildings
key management
Reliability engineering
Resiliency
BIBD
combinatorial design
Key Distribution
key refreshment
biblio
Analysis of zero-mode inrush current characteristics of converter transformers
Submitted by aekwall on Fri, 02/04/2022 - 10:21am
Surges
cyber physical systems
zero-mode inrush current
Transformers
sympathetic interaction
converter transformer
attenuation
Surge protection
Windings
Internet of Things
inrush current
remanence
Resistance
Compositionality
Resiliency
pubcrawl
Analytical models
biblio
Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets
Submitted by aekwall on Tue, 01/25/2022 - 3:51pm
attestation
blockchain
blockchains
composability
computer architecture
Human behavior
Metals
Physical Unclonable Function
programming
pubcrawl
Resiliency
Resistance
secure element
security
Software
trust
biblio
MicroPython-based Sensor Node with Asymmetric Encryption for Ubiquitous Sensor Networks
Submitted by aekwall on Mon, 01/10/2022 - 12:45pm
Resistance
Compositionality
Resiliency
Asymmetric Encryption
smartcard
sensor node
Runtime environment
MicroPython
programming
embedded systems
Knowledge engineering
Human behavior
Metrics
pubcrawl
encryption
Switches
IoT
biblio
Securing Data Communication Through MQTT Protocol with AES-256 Encryption Algorithm CBC Mode on ESP32-Based Smart Homes
Submitted by grigby1 on Mon, 01/10/2022 - 12:16pm
privacy
Smart homes
Smart Home
Scalability
Resistance
Resiliency
resilience
pubcrawl
Protocols
AES
MQTT protocol
Metrics
Internet of Things
Human behavior
Force
Esp32
encryption
android encryption
biblio
Model Fragmentation, Shuffle and Aggregation to Mitigate Model Inversion in Federated Learning
Submitted by aekwall on Mon, 12/20/2021 - 12:31pm
Adversary Models
Aggregates
Collaborative Work
differential privacy
federated learning
Human behavior
Learning systems
Metrics
Metropolitan area networks
Model inversion
privacy
pubcrawl
Resiliency
Resistance
Scalability
Training data
biblio
A Distributed Location Trusted Service Achieving k-Anonymity against the Global Adversary
Submitted by aekwall on Mon, 12/20/2021 - 12:29pm
Computational modeling
privacy
computer architecture
social networking (online)
Conferences
pubcrawl
Scalability
Metrics
Resiliency
Human behavior
Resistance
Companies
Urban areas
Location k-anonymity
location-based services
Adversary Models
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »