Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Logic gates
biblio
SIMULATION OF QUANTUM ENCODER DECODER WITH FLIP BIT ERROR CORRECTION USING REVERSIBLE QUANTUM GATES
Submitted by grigby1 on Tue, 10/08/2019 - 3:42pm
QEC
security
Scalability
reversible quantum gates
Resiliency
resilience
Quantum technology
quantum noise
quantum information
quantum gates
Quantum error correction
quantum encoder & decoder
quantum cryptography
quantum computing security
quantum computing
Quantum circuit
composability
QCAD
pubcrawl
Metrics
Logic gates
logic circuits
Integrated circuit modeling
flip bit error correction
faulty quantum gates
fault-tolerant quantum computation
error correction codes
error correction
Decoding
Computational modeling
computation process
biblio
Attention in Recurrent Neural Networks for Ransomware Detection
Submitted by aekwall on Mon, 10/07/2019 - 10:42am
Metrics
Windows environment
user access
Scalability
Resiliency
Recurrent neural networks
recurrent neural nets
ransomware sequences
ransomware executables
ransomware detection
ransomware attacks
Ransomware
pubcrawl
pattern locks
organizational level
Microprocessors
attention mechanisms
malware detection
malicious software
LSTM models
LSTM
Long short-term memory
Logic gates
learning (artificial intelligence)
invasive software
Human behavior
deep learning methods
deep learning
computer security
computer architecture
composability
biblio
Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
Submitted by aekwall on Mon, 09/23/2019 - 9:25am
Predictive Metrics
wireless sensor networks
user impersonation attack
user anonymity
telecommunication security
sensor network characteristics
secure communication
Resiliency
pubcrawl
provable user authentication scheme
provable security
Protocols
privacy-preserving user authentication protocol
privacy-preserving cryptanalysis
authentication
password change phase
password
mobile devices
message authentication
Logic gates
key agreement
Internet of Things security
Internet of Things
Elliptic curves
Elliptic curve cryptography
data privacy
Cryptographic Protocols
Compositionality
biblio
A Design and Implementation Method of IPSec Security Chip for Power Distribution Network System Based on National Cryptographic Algorithms
Submitted by grigby1 on Wed, 09/11/2019 - 1:44pm
Predictive Metrics
national cryptographic algorithm
network layer communication security
network security
Networked Control Systems Security
power distribution automation system
power distribution network system
power distribution protection
power engineering computing
power system security
Microelectronics Security
Protocols
pubcrawl
resilience
Resiliency
security protection scheme
sercurity chip
the power distribution automation system
Virtual private networks
VPN gateway
Distribution system
authentication function
authentication gateway
authorisation
composability
computer network security
Cryptographic Protocols
distribution application layer encryption authentication device
distribution master station
distribution network system
authentication
Dual Encryption
encryption
IP networks
IPSec protocol
IPSec security chip
Logic gates
master cipher machine
master system
Metrics
biblio
A management framework for secure multiparty computation in dynamic environments
Submitted by aekwall on Wed, 09/04/2019 - 10:16am
Robustness
Metadata Discovery Problem
trust establishment
SMC session
privacy-preserving collaborative computation
orchestration
management overhead
management framework
groupware
dynamic environments
Logic gates
secure multiparty computation
metadata
security of data
Cryptography
Peer-to-peer computing
privacy
composability
pubcrawl
Resiliency
computer architecture
Trusted Computing
Protocols
Internet of Things
data privacy
Scalability
biblio
Automatic stabilization of Zigbee network
Submitted by aekwall on Mon, 08/05/2019 - 9:37am
Resiliency
ZigBee sub-device
ZigBee signal strength
ZigBee relay
Zigbee network
ZigBee gateway
ZigBee coordinator
Zigbee
Wireless fidelity
Wireless communication
stable ZigBee transmission
Smart homes
Smart Home
automatic stabilization
pubcrawl
power consumption
original ZigBee node
low power consumption
Logic gates
IoT
internetworking
intelligent system
information technology
expandability
computer science
composability
biblio
Improvement of security and scalability for IoT network using SD-VPN
Submitted by aekwall on Mon, 06/17/2019 - 9:29am
Protocols
VxLAN based tunnels
VxLAN
VPN tunnels
Virtual private networks
Temperature control
Software-Defined Virtual Private Network solution
software defined networking
service chaining
security scalability
security
SDN controller
SDN
SD-VPN solution
SD-VPN
pubcrawl
automobiles
overlay VPN nature
overlay VPN
OpenvSwitch
OpenFlow protocol
OpenFlow
Logic gates
IP networks
IoT network security
IoT network scalability
IoT application
IoT
Internet of Things
computer network security
composability
biblio
Classifying Malware Using Convolutional Gated Neural Network
Submitted by grigby1 on Mon, 06/10/2019 - 1:01pm
malware classification
Task Analysis
Resiliency
resilience
Recurrent neural networks
recurrent neural nets
pubcrawl
privacy
pattern classification
neural network
microsoft malware classification challenge
Metrics
malware detection
CNN
malware
malicious software
machine learning
Logic gates
invasive software
information technology society
Human behavior
Gated Recurrent Unit
feedforward neural nets
Deep Neural Network
convolutional neural networks
convolutional gated recurrent neural network model
biblio
Cloud Insider Attack Detection Using Machine Learning
Submitted by grigby1 on Mon, 06/10/2019 - 12:56pm
security
machine learning
machine learning approaches
malicious node
misbehaving node
Monitoring
privacy
pubcrawl
resilience
Resiliency
Long short-term memory
security approaches
security of data
short-term behavioral data
trusted users
User behavior
valuable information
vulnerable information
vulnerable user node
compromised node
anomaly node
attackers
broken node
Cloud Computing
cloud insider attack detection
cloud network
cloud security issues
cloud user
composability
Anomaly Detection
Data models
data sources
deep learning
improvised long short-term memory model
internal attacker
internal attackers compromise
learning (artificial intelligence)
Logic gates
biblio
Deep Learning Based Attribute Classification Insider Threat Detection for Data Security
Submitted by aekwall on Wed, 05/08/2019 - 8:49am
long short term memory recurrent neural networks
threat detection recall
security of data
resilience
Recurrent neural networks
recurrent neural nets
pubcrawl
Principal Component Analysis based threat detection methods
principal component analysis
pattern classification
network threat
Metrics
malicious insiders
machine learning
Anomaly Detection
Logic gates
learning (artificial intelligence)
Kernel
insider threat
Human behavior
high detection rate
feature extraction
end-to-end detection framework
deep learning
Data Security
CERT insider threat dataset
attribute classifiers
attribute classification insider threat detection method
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »