Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
Hardware Implementation of A Chaotic Pseudo Random Number Generator Based on 3D Chaotic System without Equilibrium
Submitted by aekwall on Mon, 11/25/2019 - 1:09pm
lightweight systems
chaotic pseudorandom number generator
cryptography systems
deterministic chaotic systems
digital communication
digital communication systems
dynamical behavior
Dynamical Systems
Hardware Implementation
chaotic dynamics
low computational overhead
low-cost chaotic hardware
low-cost hardware platforms
simple nonlinear systems
three-dimensional chaotic flows
Three-dimensional displays
chaotic cryptography
field programmable gate arrays
chaotic behaviors
chaotic based digital systems
3D chaotic system
3D chaotic flows
chaotic communication
Predictive Metrics
random number generation
Generators
Mathematical model
composability
pubcrawl
Resiliency
embedded systems
Hardware
Cryptography
biblio
Joint Source Channel Coding with Bandwidth Compression
Submitted by aekwall on Mon, 11/25/2019 - 1:06pm
digital techniques
Wyner-Ziv coding
wireless channels
quantization scaling factor
Quantization (signal)
quantisation (signal)
memoryless bivariate Gaussian source
mean-squared error distortion
joint source channel coding
hybrid digital-analog coding system
hybrid digital-analog (HDA) coding
HDA schemes
Gaussian channels
Gaussian broadcast channel
digital-analog coding system
Resiliency
Costa coding
combined source-channel coding
channel coding
Broadcasting
Bandwidth compression
analog information
broadcast channels
distortion
Bandwidth
Mathematical model
Metrics
composability
pubcrawl
biblio
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR
Submitted by grigby1 on Tue, 11/12/2019 - 3:30pm
Symbolic-Model
privacy
protocol verification
Protocols
pubcrawl
radiofrequency identification
RFID protocols
Security Properties
stateful cryptographic protocols
symbolic model
policy-based governance
Tamarin
Tamarin prover
Theorem Proving
tools
user-defined equational theories
verification tool
XOR operations
XOR theory
Cryptography
attack identification
automated unbounded verification
collaboration
composability
Compositionality
Computational modeling
Cryptographic Protocols
Cryptographic-Protocols
Analytical models
electronic payment protocols
equational theory
Exclusive-OR
exclusive-or operations
formal verification
Formal-Verification
Mathematical model
observational equivalence
biblio
Location Determination by Processing Signal Strength of Wi-Fi Routers in the Indoor Environment with Linear Discriminant Classifier
Submitted by grigby1 on Mon, 11/04/2019 - 11:39am
Metrics
wireless LAN
Wireless fidelity
Wi-Fi signal values
Wi-Fi signal strength
Wi-Fi routers
Topology
statistical analysis
signal classification
Router Systems Security
Resiliency
resilience
pubcrawl
classification
Mathematical model
machine learning algorithms
location determination
linear discriminant analysis classification
Linear discriminant analysis
indoor radio
indoor location determination
Global Positioning System signals
Global Positioning System
Fingerprint recognition
Classification algorithms
biblio
Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organisation
Submitted by aekwall on Tue, 10/22/2019 - 8:54am
employees motivation
Security Policies Analysis
variable perceived value congruence
self-determination theory
Security policy compliant behaviour
security performance
Saudi Arabia
relatedness
perceived value congruence
perceived legitimacy
ISP compliance intentions
intrinsic motivation
information security policy compliance
information security policy
Fortune 600 organization
security of data
competence
behavioral research
autonomy
Human Factors
Personnel
computer security
Mathematical model
organisational aspects
policy-based governance
pubcrawl
Electronic mail
information security
Data models
Task Analysis
biblio
An Adaptive Method to Learn Directive Trust Strength for Trust-Aware Recommender Systems
Submitted by grigby1 on Tue, 10/15/2019 - 1:41pm
recommender systems
unified framework
Trusted Computing
trust-aware recommender systems
trust relationships
trust directions
sparse users
Social network services
security of data
Scalability
Resiliency
resilience
Adaptation models
recommendation quality
pubcrawl
Mathematical model
learning (artificial intelligence)
learn directive trust strength
Human Factors
Data models
Computational modeling
cold start
adaptive systems
adaptive method
biblio
A Threat Modeling Approach for Cloud Storage Brokerage and File Sharing Systems
Submitted by grigby1 on Thu, 09/26/2019 - 9:42am
security challenges
Measurement
Metrics
Peer-to-peer computing
pubcrawl
resilience
Resiliency
risk management
Secure Configuration
Secure File Sharing
security
Mathematical model
Security Metrics
security of data
security risk assessment
storage management
Threat Modeling
threat modeling schema
threat models
tools
trees (mathematics)
Common Configuration Scoring System
Cloud Computing
Cloud Security
cloud stakeholders
Cloud storage brokerage systems
Cloud Storage Brokers
cloud storage complexities
Cloud storage Enumeration Attack
Cloud Storage Exploitation Attack
cloud storage systems
Cloud-Security
attack tree
composability
comprehensive risk assessments
Computational modeling
conflicting security policies
Data models
file sharing systems
Human behavior
Human Factors
identified security risks
biblio
NL-IDS: Trust Based Intrusion Detection System for Network Layer in Wireless Sensor Networks
Submitted by grigby1 on Mon, 08/05/2019 - 10:35am
security issues
protocol layers
pubcrawl
resilience
Resiliency
Routing
Routing protocols
Scalability
secure path
policy-based governance
security system
sensor node trust
telecommunication security
trust
trust based intrusion detection system
Wireless Sensor Network
wireless sensor networks
WSN
Mathematical model
Black hole attackers
Blackhole attack
collaboration
composability
Conferences
false trust
Intrusion Detection
intrusion detection system
Black hole attack
Measurement
Metrics
mobile ad hoc networks
network intrusion detection
network layer
NL-IDS
periodic trust value
biblio
Machine Learning-Based Recommendation Trust Model for Machine-to-Machine Communication
Submitted by grigby1 on Mon, 06/10/2019 - 12:56pm
resilience
Naive Bayes
pattern classification
Peer-to-peer computing
privacy
pubcrawl
radial support vector machine
Random Forest
receiver operating characteristics
Reliability
Mathematical model
Resiliency
security
security issues
security threats
Supervisory Control and Data Supervisory Acquisition(SCADA)
Support vector machines
telecommunication computing
trust computation measures
Trusted Computing
k nearest neighbor
composability
Computational modeling
computer network security
Decision Tree
Decision trees
internet
Internet of Things(IoTs)
Internet of Vehicles(IoVs)
Internet Protocol
Bayes methods
learning (artificial intelligence)
machine learning
machine learning trust evaluation
Machine learning-based recommendation trust model
Machine Type Communication Devices
Machine-to-Machine communication nodes
machine-to-machine communications
Machine-to-Machine(M2M)
malicious data
biblio
A Machine Learning Attacks Resistant Two Stage Physical Unclonable Functions Design
Submitted by grigby1 on Mon, 06/10/2019 - 12:55pm
mirrors
Transistors
traditional approaches
stage physical unclonable functions design
security of data
security applications
security
Resiliency
resilience
Reliability
PUF
pubcrawl
privacy
physical unclonable function (PUF)
modelling attacks
32-bit current mirror
Mathematical model
machine learning attacks
machine learning
lightweight electronics
learning (artificial intelligence)
Hash functions
enhancing security
Current Mirror PUF
Cryptography
composability
CMOS integrated circuits
asynchronous circuits
Arbiter-PUF
65nm CMOS technology
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »