Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
Property Specific Information Flow Analysis for Hardware Security Verification
Submitted by grigby1 on Mon, 05/20/2019 - 3:30pm
Scalability
Metrics
policy-based governance
potential security violations
property specific information flow analysis
property specific search
property specific trimming technique
pubcrawl
resilience
Resiliency
Mathematical model
security
security critical paths
security model
security of data
security property
security verification
timing
Trojan horses
unintended design flaws
hardware security verification
collaboration
Complexity theory
composability
Control Theory
Design methodology
formal verification
Hardware
hardware information flow analysis
Hardware Security
Acceleration
hardware security vulnerabilities
Hardware Trojans
Human behavior
Human Factors
information flow analysis
information flow models
information flow security
information theoretic security
biblio
A Proposed Security Evaluator for Cryptosystem Based on Information Theory and Triangular Game
Submitted by grigby1 on Mon, 05/20/2019 - 3:29pm
information theoretic security
triangular game
security evaluator
Security Evaluation
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Metrics
Mathematical model
information theory
Ciphers
Human Factors
Human behavior
Games
game theory
Entropy
cryptosystem security
cryptosystem
Cryptography
composability
collaboration
biblio
Modeling Cryptographic Protocols Using the Algebraic Processor
Submitted by aekwall on Mon, 05/20/2019 - 9:02am
Human behavior
Resiliency
remote modeling
remote computers
pubcrawl
private key cryptography
MPEI algebraic processor
Metrics
Mathematical model
key distribution protocols functionality
Key Distribution
Kerberos protocol
Kerberos
internet
information protection
algebra
El Gamal signature
education-oriented capabilities
Department of Mathematical Modeling
Data models
cryptograthic protocol
Cryptography
Cryptographic Protocols
cryptographic primitives
computer network
Computational modeling
chosen cipher text attack
automata theory
automata models
automata
biblio
Enhanced pseudorandom number generator based on Blum-Blum-Shub and elliptic curves
Submitted by aekwall on Wed, 05/01/2019 - 11:37am
Metrics
Urban areas
statistical testing
squaring operation
Scalability
Resiliency
randomness tests
randomness
random processes
random number generation
public key cryptography
pubcrawl
pseudorandom number generator
NIST statistical test suite
BBS-ECPRNG approach
Mathematical model
Generators
Galois fields
enhanced pseudorandom number generator
Elliptic curves
elliptic curve points
elliptic curve point operations
Elliptic curve cryptography
Curve fitting
cryptographically secure bits
complex pseudorandom number generator
Blum-Blum-Shub
biblio
Behavioral Based Trust Metrics and the Smart Grid
Submitted by grigby1 on Fri, 03/22/2019 - 12:00pm
Smart Grid
pubcrawl
resilience
Resiliency
Routing
Scalability
security
security of data
service level strategies
power system security
smart power grids
statistical analysis
substation protection
Substations
telecommunication network routing
trust levels
trust measurements
Trusted Communications
learning (artificial intelligence)
behavioral pattern analysis
big data security
communication routing
critical components
electrical grid
Entropy
Grid Security
Grid Trust
behavioral based trust metrics
Mathematical model
Metrics
microsoft windows
Monitoring
network anomaly detection
network security
power engineering computing
biblio
Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing
Submitted by grigby1 on Fri, 03/22/2019 - 12:00pm
pubcrawl
Shuffle and Diversity MTD techniques
Servers
security of data
security metrics system risk
Security Metrics
security analysis complexity
Security analysis
security
Scalability
Resiliency
resilience
big data security
Moving Target Defense strategy
moving target defense
Moving Target Defence
Metrics
Measurement
Mathematical model
graphical security model
diversity reception
Correlation
cloud security-related problems
Cloud Computing
biblio
Hardware Implementation of Multi-Scroll Chaos Based Architecture for Securing Biometric Templates
Submitted by grigby1 on Fri, 03/22/2019 - 11:35am
hardware resources
Xilinx FPGA
Xilinx
Security analysis
security
Scalability
Resiliency
resilience
real-time systems
pubcrawl
multiscroll chaos based architecture
multi-scroll
Metrics
Mathematical model
low cost image encryption
Image Processing
biometric encryption
Hardware
FPGA
field programmable gate arrays
Euler method
embedded systems
embedded biometric systems
Cryptography
computer architecture
chaotic N × N grid multiscroll system
chaotic communication
chaos-based multiscroll encryption algorithm
chaos
biometrics-based personal authentication systems
biometrics (access control)
biometric templates
biblio
Mathematical Models of Blocks for Compensation Multipath Distortion in Spatially Separated Passive Time-Frequency Synchronization Radio System
Submitted by grigby1 on Fri, 03/15/2019 - 10:56am
Scalability
pubcrawl
Radio navigation
radio navigation systems
radio receivers
radio waves multipath propagation
radiofrequency interference
radiowave propagation
resilience
Resiliency
passive time-frequency synchronization radio system
security
signal-to-noise ratio
synchronisation
Synchronization
synchronization distortion
Telecommunications
time and frequency synchronization
Time Frequency Analysis
Time-frequency Analysis
interference-free signal
distortion
error statistics
Fourier transform
Frequency synchronization
frequency synchronization system
frequency synchronization tasks
Interference
interference component
interference suppression
correlation function
Mathematical model
mathematical models
Metrics
multi-position passive synchronization system
multipath compensation
multipath distortion
multipath interference suppressors
multipath signal propagation
biblio
Time Series Forecasting by Evolving Deep Belief Network with Negative Correlation Search
Submitted by grigby1 on Wed, 03/06/2019 - 3:30pm
resilience
neural nets
neural network models
Neural networks
optimisation
optimization
policy-based governance
pubcrawl
random search
Negative correlation search
Resiliency
Scalability
search problems
time series
Time series analysis
time series datasets
time series forecasting
Training
forecasting theory
Bayesian optimization
belief networks
collaboration
composability
DBN
Deep Belief Network
derivative-free optimizer-negative correlation search
forecasting
Bayes methods
grid search
Human behavior
hyperparameters optimization
learning (artificial intelligence)
learning rates
Load modeling
Mathematical model
Metrics
biblio
Nonlinear System Identification Method Based on Improved Deep Belief Network
Submitted by grigby1 on Wed, 03/06/2019 - 3:30pm
Mathematical model
Training
single crystal furnace
Silicon
shallow BP network
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
parameters identification
nonlinear systems
nonlinear system identification method
nonlinear control systems
Metrics
belief networks
improved deep belief network
Human behavior
higher identification accuracy
Deep Belief Network
DBN
Data models
Crystals
CRBM
continuous restricted Boltzmann machine
Continuous Resricted Boltzmann Machine
composability
collaboration
Boltzmann machines
Biological neural networks
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
…
next ›
last »