Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Performance analysis
biblio
Some Discussions on PHY Security in DF Relay
Submitted by grigby1 on Fri, 09/01/2023 - 2:23pm
probability
secrecy performance analysis
Decode-and-forward
Human Factors
Computer simulation
power system reliability
Physical layer
physical layer security
information theoretic security
Performance analysis
Compositionality
collaboration
military communication
composability
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
biblio
Performance Analysis of DDoS Mitigation in Heterogeneous Environments
Submitted by grigby1 on Thu, 06/22/2023 - 2:10pm
DDoS
Intelligent Transport Systems
attack prevention
DDoS Attack Prevention
Attack detection
Resiliency
denial-of-service attack
computer networks
Performance analysis
Compositionality
information security
VANETs
composability
telecommunication traffic
Computational modeling
Protocols
resilience
Metrics
pubcrawl
machine learning
biblio
ATDD: Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage
Submitted by grigby1 on Fri, 06/16/2023 - 3:56pm
Access Control
assured data deletion
Cloud Computing
cloud storage
Conferences
data deletion
encryption
Memory
Performance analysis
pubcrawl
Scalability
time-sensitive data
biblio
CP-ABE with multi-Authorization Centers and Supporting Outsourcing Encryption and Decryption
Submitted by grigby1 on Fri, 05/19/2023 - 2:07pm
encryption
Cloud Computing
pubcrawl
policy-based governance
collaboration
Scalability
authorization
Protocols
Performance analysis
CP-ABE
Costs
encryption and decryption outsourcing
multi-authorization center
smart agriculture
two - party security calculation
biblio
Analysis of Java Lock Performance Metrics Classification
Submitted by grigby1 on Fri, 05/12/2023 - 10:27am
Memory management
taxonomy
Systematics
synchronization mechanism
security
Resiliency
resilience
Performance analysis
Metrics
pubcrawl
Measurement
Java locks
Java
Instruction sets
Data Security
Concurrency
composability
classification
biblio
Secrecy Outage Performance Analysis for IRS-Aided Cognitive Radio NOMA Networks
Submitted by aekwall on Fri, 04/28/2023 - 9:41am
simulation
probability
pubcrawl
Performance analysis
physical layer security
Resiliency
Rayleigh channels
Monte Carlo methods
NOMA
Non-Orthogonal Multiple Access (NOMA)
cognitive radio
intelligent reflecting surface (IRS)
physical layer security.
Cognitive Radio Security
biblio
An Approach for P2P Based Botnet Detection Using Machine Learning
Submitted by grigby1 on Fri, 04/14/2023 - 3:58pm
malware
Workstations
Support vector machines
Resiliency
resilience
pubcrawl
Performance analysis
network security
Metrics
analysis
machine learning
Instruments
detection techniques
Compositionality
composability
botnets security
botnet
biblio
PRIDE: A Privacy-Preserving Decentralised Key Management System
Submitted by aekwall on Fri, 03/03/2023 - 10:52am
blockchain
proofs of knowledge
Privacy-preserving
ERTMS
Rail transportation
Forensics
Europe
key management
Performance analysis
Organizations
Human behavior
Resiliency
Metrics
Scalability
pubcrawl
Public key
Conferences
biblio
Decentralizing loT Public- Key Storage using Distributed Ledger Technology
Submitted by grigby1 on Fri, 02/17/2023 - 5:18pm
Resistance
public-key
loT
file storage
scalable verification
Distributed Ledger Technology
distributed ledger
Tamper-Resistance
Performance analysis
Public key
pubcrawl
Compositionality
smart contracts
Wireless communication
Protocols
Scalability
Resiliency
resilience
Metrics
biblio
A Novel Approach Exploiting Machine Learning to Detect SQLi Attacks
Submitted by grigby1 on Fri, 02/03/2023 - 3:50pm
Databases
false negative
CountVectorizer
SQL injection detection
False Positive
OWASP
SQL injection
Performance analysis
attacks
Data mining
feature extraction
privacy
Analytical models
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
machine learning algorithms
1
2
3
4
5
6
7
8
next ›
last »