Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Heuristic algorithms
biblio
A Selection Strategy for Network Security Defense Based on a Time Game Model
Submitted by grigby1 on Fri, 08/26/2022 - 11:09am
security
pubcrawl
Heuristic algorithms
Analytical models
real-time systems
network security
Games
Metrics
Nash Equilibrium
Computing Theory
numerical simulation
Infectious Disease Model
network defense
Optimal Defense Strategy
time game
biblio
JANUS: Boosting Logic Obfuscation Scope Through Reconfigurable FSM Synthesis
Submitted by grigby1 on Fri, 07/29/2022 - 9:45am
Scalability
pattern locks
Tamper-proof Memory
logic obfuscation
logic locking
boosting
supply chains
Partitioning algorithms
Switches
security
Hardware Security
Hardware
Heuristic algorithms
Resiliency
resilience
Human behavior
pubcrawl
biblio
A Suggested Model for Mobile Application Penetration Test Framework
Submitted by grigby1 on Thu, 07/28/2022 - 2:07pm
iOS Security
Analytical models
composability
dynamic analysis
Heuristic algorithms
Human behavior
Hybrid Analysis
information security
Mobile Security
operating systems
pubcrawl
resilience
Resiliency
security
social networking (online)
static analysis
biblio
Facial Expression Recognition Method Based on Cascade Convolution Neural Network
Submitted by grigby1 on Tue, 07/05/2022 - 12:27pm
convolution
convolution neural network
Neural networks
pubcrawl
Human behavior
resilience
Resiliency
Heuristic algorithms
Databases
Wireless communication
Metrics
face recognition
facial recognition
Educational robots
facial expression recognition
Cascade Algorithm
biblio
Detection of False Data Injection Attacks in smart grids based on cubature Kalman Filtering
Submitted by grigby1 on Tue, 07/05/2022 - 11:24am
delays
Square root cubature Kalman filter
cosine similarity
false data injection attacks
False Data Detection
Power measurement
Prediction algorithms
Smart Grids
Attack detection
pubcrawl
composability
Data models
Filtering
Heuristic algorithms
Resiliency
resilience
Human behavior
biblio
Optical Hash Function for High Speed and High Security Algorithm using Ring Resonator System
Submitted by grigby1 on Thu, 06/09/2022 - 2:36pm
pubcrawl
resilience
Heuristic algorithms
computer security
Compositionality
Hash Function
Hash functions
hash algorithms
Integrated optics
Resiliency
optical cryptography
Optical design
Optical filters
Optical solitons
Resonator filters
ring resonator
biblio
Research on Key Technology of Software Intellectual Property Protection
Submitted by grigby1 on Wed, 06/08/2022 - 10:19am
pubcrawl
policy-based governance
resilience
Resiliency
Heuristic algorithms
composability
Java
Software algorithms
reverse engineering
intellectual property
software protection
intellectual property security
obfuscation
codes
software intellectual property protection
SOPM
biblio
Advanced Forwarding Strategy Towards Delay Tolerant Information-Centric Networking
Submitted by grigby1 on Tue, 05/24/2022 - 3:57pm
Metrics
multicast communication
multicast
Delay Tolerant
Information-Centric Networking (ICN)
telemedicine
Multicast algorithms
information-centric networking
Routing protocols
Compositionality
pubcrawl
network topology
Information Centric Networks
composability
Scalability
Heuristic algorithms
Resiliency
resilience
collaboration
Human behavior
biblio
Construction of immersive scene roaming system of exhibition hall based on virtual reality technology
Submitted by grigby1 on Mon, 05/23/2022 - 3:58pm
Three-dimensional displays
Roam
Immersive scene
Exhibition hall
Immersive experience
VR
education
Media
immersive systems
pubcrawl
Solid modeling
Software algorithms
composability
privacy
Heuristic algorithms
Resiliency
Human Factors
Human behavior
biblio
ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis
Submitted by aekwall on Thu, 05/19/2022 - 1:36pm
Benchmark testing
privacy
tools
Heuristic algorithms
pubcrawl
Metrics
composability
static analysis
Sensitivity
Context Sensitivity
Dynamic Supplement
Software systems
taint analysis
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »