Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
algebra
biblio
Conversational Agent Design for Algebra Tutoring
Submitted by grigby1 on Fri, 05/12/2023 - 10:09am
pubcrawl
Human behavior
Metrics
Scalability
Natural languages
conversational agents
algebra
Problem-solving
user interfaces
cybernetics
Intelligent tutoring systems (ITS)
natural language processing (NLP)
Natural language understanding (NLU)
RASA
biblio
Formal Specification and Verification of 5G Authentication and Key Agreement Protocol using mCRL2
Submitted by grigby1 on Fri, 08/26/2022 - 11:24am
Metrics
Process Algebra.
mCRL2 language
formal methods
5G-AKA Protocol
formal verification
Concurrency
algebra
3GPP
5G networks
tools
composability
Protocols
5G mobile communication
authentication
Analytical models
Resiliency
resilience
pubcrawl
security
biblio
Generation and Distribution Secret Encryption Keys with Parameter
Submitted by grigby1 on Tue, 05/25/2021 - 3:22pm
Human Factors
Workstations
Scalability
Resilient
resilience
Reliability
registration center
public key cryptography
Public key
pubcrawl
Prototypes
parametric algebra
multiplication
Metrics
algebra
Human behavior
exponential
excitation
encryption
distributing
discrete logarithm
cryptosystem
cryptology
cryptographic key
composability
Communication channels
collaboration
biblio
Neural Algebra of Classifiers
Submitted by grigby1 on Mon, 10/05/2020 - 2:02pm
image recognition
visualization
visual recognition benchmarks
Training
simple visual classifiers
pubcrawl
Neural networks
neural network modules
neural nets
neural algebra
algebra
image classification
Compositionality
complex visual concept
classifier
boolean algebra operations
Boolean algebra
Birds
Beak
biblio
Algebraic Patterns of Vulnerabilities in Binary Code
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
sockets
symbolic modelling
rewriting rules
pattern creation
cyber reasoning systems
behaviour algebra
algebraic patterns
algebraic matching methods
algebraic matching
algebraic approach
algebra equations
Binary codes
binary code
Buffer overflows
Registers
Compositionality
Semantics
algebra
program diagnostics
pattern matching
vulnerability detection
Metrics
pubcrawl
Human behavior
Resiliency
biblio
Two-Level Algebraic Method for Detection of Vulnerabilities in Binary Code
Submitted by aekwall on Mon, 02/17/2020 - 2:41pm
Human behavior
vulnerability pattern matching
vulnerability detection
Vulnerability
vulnerabilities detection
two-level algebraic method
Symbolic Execution
Semantics
Resiliency
pubcrawl
pattern matching
model checking
Metrics
Mathematical model
algebra
fuzzing
Formal Specification
formal methods
exploit
Cybersecurity
Compositionality
Buffer overflows
Binary codes
binary code
behavior matching
behavior algebra
algebra expressions
biblio
Hardware-Oriented Algebraic Fault Attack Framework with Multiple Fault Injection Support
Submitted by aekwall on Mon, 01/20/2020 - 12:00pm
Hardware
tools
security-critical hardware implementations
Scalability
Resiliency
pubcrawl
Post /Pre silicon analysis
multiple fault injection support
Mathematical model
Lightweight Ciphers
lightweight block ciphers
Integrated circuit modeling
idealized fault models
hardware-oriented structural cipher descriptions
hardware-oriented framework
hardware-oriented algebraic fault attack framework
actual implementation
framework
field-programmable gate array platform
field programmable gate arrays
fault injector
Fault injction attack
Cryptography
conjunctive normal form clauses
Circuit faults
Ciphers
cipher implementations
Cipher
Analytical models
algebraic fault attack tool
algebraic equations
algebra
biblio
A DNA-Sticker Algorithm for Cryptanalysis LFSRs and NLFSRs Based Stream Cipher
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
linear feedback shift register based stream cipher
decision technique
DNA computing
DNA Cryptanalysis
DNA molecules
DNA sticker model based algorithm
DNA-based algorithm
Electron tubes
genetic bases
key stream bit
LFSR
LFSRs equation
cryptographic systems
molecular biophysics
molecular computing
NLFSR
NLFSRs
nonlinear feedback shift register based stream cipher
parallel computations
parallel search
shift registers
Sticker-Model
TEST TUBE
feedback
Computational modeling
resilience
pubcrawl
Human behavior
Metrics
Cryptography
cryptanalysis
search problems
Ciphers
DNA
privacy
Resiliency
stream cipher
biocomputing
biological operations
Adelman's DNA computing experiment
algebra
algebraic code
bit string
cipher characters
computability model
biblio
Fine-Grained Provenance for Matching ETL
Submitted by aekwall on Mon, 09/23/2019 - 10:40am
provenance APIs
data provenance tools
data science tasks
data types
data warehouses
database provenance tools
database-style provenance techniques
matching computations
matching tasks
Provenance
data objects
provenance-driven troubleshooting tool
PROVision
Record linking
support optimization
track provenance
tuple-level provenance
workflow
workflow management software
workflow provenance systems
Data mining
Resiliency
Human behavior
pubcrawl
composability
Metrics
optimization
ETL
tools
data analysis
Task Analysis
database management systems
application program interfaces
Instruments
Semantics
algebra
arbitrary code
code versions
common ETL
biblio
Modeling Cryptographic Protocols Using the Algebraic Processor
Submitted by aekwall on Mon, 05/20/2019 - 10:02am
Human behavior
Resiliency
remote modeling
remote computers
pubcrawl
private key cryptography
MPEI algebraic processor
Metrics
Mathematical model
key distribution protocols functionality
Key Distribution
Kerberos protocol
Kerberos
internet
information protection
algebra
El Gamal signature
education-oriented capabilities
Department of Mathematical Modeling
Data models
cryptograthic protocol
Cryptography
Cryptographic Protocols
cryptographic primitives
computer network
Computational modeling
chosen cipher text attack
automata theory
automata models
automata
1
2
next ›
last »