Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Heuristic algorithms
biblio
A Multiple-Replica Provable Data Possession Algorithm Based on Branch Authentication Tree
Submitted by aekwall on Tue, 10/12/2021 - 3:13pm
security
authentication
Heuristic algorithms
Conferences
pubcrawl
Resiliency
Compositionality
Software algorithms
Predictive Metrics
data integrity
provable security
Multi Branch Authentication Tree
Multiple-Replica
provable data possession
software engineering
Vector Dot Product
biblio
Automatically Generating Malware Summary Using Semantic Behavior Graphs (SBGs)
Submitted by grigby1 on Tue, 09/21/2021 - 3:51pm
Malware Analysis
Semantics
semantic behavior graph
Resiliency
resilience
pubcrawl
privacy
microsoft windows
Metrics
malware summary
behavior association
malware
Human behavior
Heuristic algorithms
Grippers
graph theory
feature extraction
Data mining
behavior description
biblio
Secure Communication Using Steganography in IoT Environment
Submitted by grigby1 on Tue, 08/31/2021 - 12:58pm
Complexity theory
Cryptography
Heuristic algorithms
image segmentation
IoT
microcontroller
microcontrollers
performance evaluation
PSNR
pubcrawl
QR code
QR codes
resilience
Resiliency
Steganography
biblio
Analysis of Algorithms for User Authentication using Keystroke Dynamics
Submitted by grigby1 on Tue, 08/17/2021 - 4:17pm
authentication
Forestry
Heuristic algorithms
Human behavior
keystroke analysis
keystroke dynamics
machine learning
Metrics
password
pubcrawl
tuning
User Authentication and XGBoost
Vegetation
biblio
A Framework for Key Management Architecture for DTN (KMAD): Requirements and Design
Submitted by aekwall on Tue, 08/17/2021 - 4:15pm
key establishment
styling
style
Scalability
Resiliency
pubcrawl
Protocols
Metrics
Key Management Architecture
key management
authentication
insert (key words) DTN
Human behavior
Heuristic algorithms
framework
formatting
computer architecture
component
Ciphers
biblio
Distributed Grid restoration based on graph theory
Submitted by aekwall on Tue, 07/27/2021 - 2:11pm
Computing Theory
resilience
composability
Compositionality
Computing Theory and Resilience
graph theory
Grid islanding
Grid restoration
Heuristic algorithms
pubcrawl
Signal processing algorithms
Smart Grids
standards
Switches
taxonomy
biblio
PAM PAL: Policy-Aware Virtual Machine Migration and Placement in Dynamic Cloud Data Centers
Submitted by grigby1 on Thu, 07/08/2021 - 2:26pm
Approximation algorithms
virtual machine security
virtual machine
virtual machine migration
Policy-Aware Data Centers
Algorithms
virtual machine placement
optical switches
data centers
Cyber Physical System
Cryptography
Virtual machining
composability
Heuristic algorithms
Resiliency
resilience
pubcrawl
security
Cloud Computing
biblio
Negative Feedback Dynamic Scheduling Algorithm based on Mimic Defense in Cloud Environment
Submitted by aekwall on Wed, 07/07/2021 - 5:11pm
mimic defense
composability
virtualization privacy
Human behavior
Resiliency
Metrics
pubcrawl
negative feedback control
Negative feedback
Monitoring
Heuristic algorithms
Dynamic scheduling
cloud environment
Virtual machining
real-time systems
Cloud Computing
privacy
biblio
Privacy Preserving Average Consensus by Adding Edge-based Perturbation Signals
Submitted by grigby1 on Wed, 06/02/2021 - 12:20pm
Control Theory
convergence
Cryptography
Heuristic algorithms
Human behavior
multi-agent systems
Perturbation methods
privacy
pubcrawl
resilience
Resiliency
Scalability
Signal processing algorithms
biblio
Privacy-Preserving Policy Synthesis in Markov Decision Processes
Submitted by grigby1 on Wed, 06/02/2021 - 12:18pm
Privacy Policies
Computing Theory
Computing Theory and Privacy
Control Theory
differential privacy
dynamic programming
Heuristic algorithms
History
Human behavior
Markov processes
privacy
Probabilistic logic
pubcrawl
resilience
Resiliency
Scalability
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »