Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Logic gates
biblio
Blockchain Based Fine-Grained and Scalable Access Control for IoT Security and Privacy
Submitted by aekwall on Mon, 02/10/2020 - 11:43am
contracts
Microelectronics Security
transaction
scalable access control
Permission
multiindex table struct
fine-grained access control strategies
decentralized IoT system
access records
access control issue
smart contract
Predictive Metrics
Logic gates
IoT
IoT security
cryptocurrencies
database
blockchain
composability
pubcrawl
Resiliency
Internet of Things
data privacy
authorisation
Access Control
computer network security
biblio
Network Penetration Identification Method Based on Interactive Behavior Analysis
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
penetration attacks
long-term memory shortage
LSTM
malicious attacks
Mathematical model
Metrics
national economy
Network penetration identification method
network penetration recognition technology
ordinary recurrent neural network
penetration attack
Long short-term memory
pubcrawl
recurrent neural nets
recurrent neural network
Recurrent neural networks
Sebek
Sebek technology
short-short time memory network
time series
time series modeling
Hidden Markov models
attack recognition method
attacker information collection
attacker keystroke record
Computer hacking
computer network security
Data models
feature extraction
gradient disappearance problem
gradient explosion
attack identification
honeynet
Human behavior
Human Factors
interaction behavior
interactive behavior analysis
internet
keystroke analysis
keystroke sequences
Logic gates
biblio
Optimizing Quantum Circuits for Modular Exponentiation
Submitted by aekwall on Mon, 01/20/2020 - 11:48am
pubcrawl
verilog implementation
tools
scalable synthesis methods
Scalability
reversible modular exponentiation function
Resiliency
Qubit
Quantum error correction
Quantum Error Correcting Codes (QECC)
quantum computing
quantum computers
quantum circuits
quantum architectures
Quantum Algorithm(QA)
computer architecture
modular exponentiation functions
modular exponentiation
Logic gates
logic designs
logic design
logic circuits
linear nearest neighbor property
Linear Nearest Neighbor (LNN)
Hardware design languages
hardware description languages
exponentiation functions
exponentiation
error correction
biblio
Sub-Modular Circuit Design for Self-Balancing Series-Connected IGBTs in a Modular Multilevel Converter
Submitted by aekwall on Mon, 01/20/2020 - 11:47am
pubcrawl
voltage-source convertors
voltage sharing
Voltage control
voltage capacity
Transient analysis
sub-modular level
sub-modular circuit design
sensing complexity
self-balancing series-connected IGBT
Resiliency
Capacitors
modular multilevel converter
MMC
Logic gates
insulated gate bipolar transistors
Gate drivers
expandability
delays
composability
communication complexity
central series IGBT controller
biblio
Security for the Industrial IoT: The Case for Information-Centric Networking
Submitted by aekwall on Mon, 01/13/2020 - 12:18pm
Internet of Things
unprotected channel
telecommunication power management
sensors
security
secure networking solution
safety-critical industrial IoT
Safety
robust communication
Resiliency
pubcrawl
production engineering computing
Metrics
Logic gates
IP-based approaches
internetworking
actuator security
internet
inter-networking
inter-networked sensors
information-centric networking
Information Centric Network
information centric networking
industrial safety systems
industrial production plants
industrial plants
Human behavior
DoS resilience
content-centric security model
computer network security
composability
Cloud Computing
biblio
An Efficient SAT-Attack Algorithm Against Logic Encryption
Submitted by grigby1 on Tue, 01/07/2020 - 10:54am
information science
Superluminescent diodes
SAT-attack algorithm
SAT
Resiliency
resilience
pubcrawl
logic IP protection
Logic gates
logic encryption
integrated circuits
Benchmark testing
encryption
encrypted circuits
efficient encryption
decryption
cyber physical systems
Cyber Physical System
Cryptography
computability
composability
biblio
Arithmetic Circuit Homomorphic Encryption and Multiprocessing Enhancements
Submitted by aekwall on Mon, 12/30/2019 - 12:36pm
Homomorphic encryption
TFHE library
OpenMP
multiprocessing enhancements
multiplication operation
MPI
latency reduction
Boolean Circuit
arithmetic operations
arithmetic circuit homomorphic encryption
Arithmetic Algorithm
arithmetic
adders
Informatics
Cloud Computing
multiprocessing systems
Registers
Human Factors
cloud services
Logic gates
Libraries
Metrics
pubcrawl
Resiliency
encryption
Cryptography
Scalability
biblio
A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
Microservices Security
Application Container Security
automatic code generation techniques
business capabilities
cyber risk
diversification index
economics-of-scale incentives
microservice architectures structure
microservices attack surfaces
program compilers
moving target defense mechanism
MSA
multistep attacks
security risk assessment
security risk-oriented software diversification
Transforms
compiler security
security of data
Compositionality
moving target defense
Security Metrics
business data processing
risk analysis
Logic gates
Indexes
Software Architecture
Measurement
Metrics
pubcrawl
Resiliency
Software
security
Scalability
biblio
Don't Talk Unless I Say So! Securing the Internet of Things with Default-Off Networking
Submitted by grigby1 on Wed, 10/30/2019 - 10:53am
Logic gates
Web browser
smart lock
smart devices
Servers
Security by Default
Scalability
Resiliency
resilience
pubcrawl
policy language
network security
minimal access permissions
Access Control
IoT networks
IoT device communications
IoT application protocols
Internet of Things
internet
default-off networking
Computer crime
Cloud Computing
bluetooth low energy
Bluetooth
Bark phrases access control policies
authorisation
biblio
IPsec/Firewall Security Policy Analysis: A Survey
Submitted by aekwall on Tue, 10/22/2019 - 9:53am
internetworking
Security Policies Analysis
traffic control
security policy verification
security policy misconfigurations
security policy management
Security policy anomalies
policy analysis
network security protection
network safety
IPsec security policy analysis
IPsec gateways
formal verification
Firewall Security policy analysis
firewall
Conflicts analysis
computer network security
Virtual private networks
security policy
Firewalls (computing)
Logic gates
IPsec
network security
computer networks
Communication networks
Correlation
Filtering
policy-based governance
pubcrawl
authorisation
IP networks
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »