Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Physics
biblio
A New Four-Dimensional Chaotic System and Its Application in Speech Encryption
Submitted by aekwall on Mon, 01/18/2021 - 11:21am
chaotic communication
chaotic cryptography
Correlation
Cryptography
encryption
four-dimensional chaotic system
key space
low-dimensional chaotic encryption
Metrics
Physics
pubcrawl
Resiliency
Scalability
speech encryption
speech processing
biblio
Kerberos: a 48-Channel Analog Processing Platform for Scalable Readout of Large SDD Arrays
Submitted by aekwall on Mon, 10/19/2020 - 11:59am
scalable readout
low-cost multichannel readout option
monolithic array
multichannel scalable analog processing
Neutrino sources
nuclear electronics
pixellated detectors
position sensitive particle detectors
Preamplifiers
readout electronics
scalable processing solution
KATRIN experiment
SDD arrays
semiconductor counters
simple cost multichannel readout option
solid scintillation detectors
spectroscopic quality
sterile neutrino existence
TRISTAN detector development
TRISTAN project
viable processing solution
Metrics
field programmable gate arrays
Cryptography
Resiliency
Human behavior
pubcrawl
data acquisition
Semiconductor device measurement
Kerberos
Physics
Detectors
16-channel integrated programmable analog pulse processors
48-channel analog processing platform
analog ASIC-based solution
application specific integrated circuits
back-end electronics
beta-decay spectroscopy
continuous spectrum
detection modules
digital pulse processor
biblio
Toward Limiting Social Botnet Effectiveness while Detection Is Performed: A Probabilistic Approach
Submitted by grigby1 on Fri, 09/11/2020 - 12:08pm
social networking (online)
social media botnets
social botnet effectiveness
social botnet
deterministic propagation actions
Physics
social media platforms
botnet
game theory
Statistics
Sociology
social media
social media networks
pubcrawl
Social network services
probability
probabilistic model
Probabilistic logic
Compositionality
Metrics
botnets
invasive software
computer science
security
Resiliency
biblio
Look Inside: Understanding Thermal Flux Through Augmented Reality
Submitted by grigby1 on Fri, 08/28/2020 - 12:32pm
perception gap
virtual reality environment
university dropout rate
thermal flux
science technology engineering mathematics field
Scalability
resilience
real-time systems
real-time augmentation
pubcrawl
Prototypes
privacy
Physics computing
Physics
attention split
mixed reality application
learning material
Human behavior
high school
Heating systems
H.5.m [Information Interfaces and Presentation]: Miscellaneous
false-color visualization
engineering education
Data visualization
data visualisation
computer aided instruction
augmented reality environment
augmented reality
biblio
Mathematical Formulation and Implementation of Query Inversion Techniques in RDBMS for Tracking Data Provenance
Submitted by aekwall on Mon, 03/30/2020 - 11:32am
RDBMS
unexpected results
Springs
relational database management system
relational algebra operations
relational algebra
query inversion techniques
Physics
mathematical formulations
mathematical formulation
inversion queries
inverse queries
Data-Intensive Applications
data provenance tracking
data provenance finding
data origin
History
data provenance
Provenance
Flowcharts
relational databases
finance
Databases
database
query processing
Metrics
biology
composability
pubcrawl
Human behavior
Resiliency
biblio
BYOD for Physics Lab: Studying Newton's Law of Cooling with a Smartphone
Submitted by grigby1 on Mon, 03/19/2018 - 2:04pm
Analogical Transfer
analogies
computer skills
heat transfer
high-school students
Human behavior
Human Factors
Newton's law of cooling
Physics
pubcrawl
smartphone
thermometer
Transference
biblio
Mathematical cryptanalysis of \#x201C;personalized information encryption using ECG signals with chaotic functions \#x201D;
Submitted by grigby1 on Wed, 12/27/2017 - 1:08pm
Henon map
text encryption
text analysis
Secret key
Resiliency
pubcrawl
Physics
personalized information encryption
Optics
numerical simulation
Metrics
mathematical cryptanalysis
image data encryption
Heuristic algorithms
Henon mapping
bifurcation
Electrocardiography
electrocardiogram
ECG signals
data encryption algorithm
cryptosystem
Cryptography
cryptanalysis
composability
Chosen-plaintext attack
chaotic system
chaotic functions
chaotic cryptography
chaos
biblio
A fresh look at network science: Interdependent multigraphs models inspired from statistical physics
Submitted by John Baras on Fri, 10/24/2014 - 12:51pm
network topology
Human behavior
hybrid network
interacting dynamic multigraphs
interdependent multigraphs models
multi-robot systems
multimetric problems
network science
network science perspective
network theory (graphs)
Games
Peer-to-peer computing
Physics
social network
SoS Lablet
statistical physics
Stochastic processes
trust
Trust, Recommendation Systems, and Collaboration
constrained coalitional games
Biological system modeling
coevolving multigraphs
collaboration
collaboration multigraphs
collaborative control
communication multigraphs
Communication Network
communication topology
complex networks
biological network
constrained coalitional network games
control network
cooperative multi-agent systems
cooperative swarms
distributed task execution
economic network
expander graphs
game theory
biblio
A Formalization of the Security Features of Physical Functions
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
key generation algorithms
Unpredictability
Unclonability
side channels attacks
security features
rudimentary security models
Robustness
quantification tools
PUF
Physics
Physically Unclonable Function (PUF)
physical unclonable functions
physical functions
physical attacks
Noise measurement
manufacturing
Adaptive optics
Integrated optics
integrated circuits
information systems security
Information Leakage
Formal Security Model
fault injection attacks
erroneous computations
Cryptography
cryptographic research
cryptographic devices
cryptographic constructions
context intrinsic physical properties
block ciphers
anticounterfeiting schemes
algorithmic solutions