Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Performance analysis
biblio
EPF-CLPA: An Efficient Pairing-Free Certificateless Public Auditing for Cloud-based CPS
Submitted by aekwall on Fri, 05/06/2022 - 11:51am
Cloud Computing
Servers
Public key
cloud storage
pubcrawl
Resiliency
Computational efficiency
Elliptic curve cryptography
Compositionality
Performance analysis
Predictive Metrics
Certificateless Auditing
Cyber Physical Systems (CPS)
Identity-based encryption
integrity
encryption audits
biblio
Enhanced DNA Cryptosystem for Secure Cloud Data Storage
Submitted by grigby1 on Fri, 05/06/2022 - 9:33am
resilience
Intron sequence
Encoding table
Memory
DNA encoding
DNA cryptography
decryption
DNA
Performance analysis
Robustness
encryption
Metrics
encoding
Cryptography
privacy
Resiliency
Human behavior
pubcrawl
Cloud Computing
biblio
Research on Image Encryption Technology Based on Hyperchaotic System and DNA Encoding
Submitted by grigby1 on Fri, 05/06/2022 - 9:33am
Performance analysis
six-dimensional hyperchaotic system
logistic mapping
DNA coding
DNA cryptography
Resists
image encryption
DNA
Image coding
encryption
resilience
Metrics
encoding
privacy
Conferences
Resiliency
Human behavior
pubcrawl
biblio
Efficient Split Counter Mode Encryption for NVM
Submitted by grigby1 on Thu, 05/05/2022 - 2:13pm
encryption
pubcrawl
resilience
Resiliency
Software
optimization
composability
Memory management
Performance analysis
cyber physical systems
cyber physical system security framework
Limiting
Nonvolatile memory
efficient encryption
biblio
Cryptanalysis and Improvement of Zheng's Signcryption Technique
Submitted by grigby1 on Tue, 04/26/2022 - 1:51pm
Message confidentiality and integrity
Signcryption technique
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
Protocols
Performance analysis
Costs
Hash functions
encryption
ElGamal's digital signature
DSS
digital signatures
DHP
cryptographic hash functions
biblio
Performance Analysis on Denial of Service attack using UNSW-NB15 Dataset
Submitted by aekwall on Fri, 04/01/2022 - 1:07pm
Intrusion Detection
feature extraction
pubcrawl
Resiliency
cyberattack
Compositionality
Performance analysis
malware
network security
Predictive Metrics
information management
scientific computing
DoS
filtering theory
UNSW-NB15
Scientific Computing Security
biblio
Attribute-Based Searchable Encryption Scheme Supporting Efficient Range Search in Cloud Computing
Submitted by grigby1 on Fri, 04/01/2022 - 12:09pm
Performance analysis
multi-search mechanism
multi-keyword search
LSSS matrix
chosen-keyword attack
1-coding theory
0
Search methods
searchable encryption
encryption
composability
data privacy
Conferences
Resiliency
resilience
pubcrawl
security
Cloud Computing
biblio
A Study On Naming and Caching in Named Data Networking
Submitted by aekwall on Tue, 03/08/2022 - 1:43pm
Resiliency
Vehicular Named Data Networking (VNDN)
Named Data Networking(NDN)
content centric
Vehicular Communication
named data networking
data structures
Performance analysis
Human behavior
security
pubcrawl
Scalability
Internet of Things
Cloud Computing
IoT
delays
IP networks
biblio
Performance Analysis of Adhoc On-demand Distance Vector Protocol under the influence of Black-Hole, Gray-Hole and Worm-Hole Attacks in Mobile Adhoc Network
Submitted by aekwall on Mon, 01/10/2022 - 11:53am
network layer attacks
Worm-hole
simulation
security mechanism
Scalability
Routing protocols
Routing
Resiliency
pubcrawl
Performance analysis
AODV
NETSIM
MANET
Human behavior
gray-hole attack
energy consumption
Earthquakes
control systems
black-hole attack
Attack vectors
biblio
Performance Analysis of Zero-Trust Multi-Cloud
Submitted by grigby1 on Tue, 12/21/2021 - 2:20pm
Performance analysis
zero trust networking
zero trust
testing
sidecar proxy
Service Mesh
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Acoustic Fingerprints
multi cloud
Kubernetes
Istio
Human Factors
Human behavior
Cryptography
Conferences
collaboration
codes
Cloud Computing
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »