Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Logic gates
biblio
State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid
Submitted by grigby1 on Thu, 03/28/2019 - 2:16pm
recursive filters
power engineering computing
power system security
PPTD scheme
privacy
privacy preservation
privacy-preserving energy theft detection scheme
pubcrawl
recursive filter
Metrics
security
Smart Grid
Smart Grid Privacy
Smart Grids
smart meters
smart power grids
state estimation based energy theft detection scheme
abnormal data
Logic gates
Local area networks
information privacy issues
individual households
Human behavior
energy theft behaviors
energy savings
energy consumption
electricity bill payments
Data Transmission
data privacy
Cryptography
composability
attacked meters
abnormal users
biblio
Enabling Hardware Trojan Detection and Prevention through Emulation
Submitted by grigby1 on Fri, 03/15/2019 - 10:59am
Logic gates
Trojan horses
trojan horse detection
Trojan attack signatures
trojan
tools
Supply Chain
pubcrawl
programmable hardware
Payloads
emulation
invasive software
in-service systems
in-design systems
HWA
hardware Trojan detection
Hardware Assurance
Hardware
FPGA
field programmable gate arrays
biblio
Hardware Trojan Detection Using Path Delay Order Encoding with Process Variation Tolerance
Submitted by grigby1 on Fri, 03/15/2019 - 10:59am
Logic gates
variation-tolerant path delay order encoding technique
Trojan horses
trojan horse detection
security threats
security
pubcrawl
process variation tolerance
path delay information
outsourcing
delays
HT detection techniques
Hardware Trojans
hardware Trojan detection
Hardware
Foundries
fabrication
encoding
DfT
design-for-trust techniques
biblio
Designing Subspecies of Hardware Trojans and Their Detection Using Neural Network Approach
Submitted by grigby1 on Fri, 03/15/2019 - 10:58am
learning (artificial intelligence)
true positive rate
Trojan horses
trojan horse detection
trigger circuits
TPR
third-party vendors
pubcrawl
outsourcing
neural-network based hardware-Trojan detection method
neural network approach
neural network
neural nets
machine-learning-based hardware-Trojan detection method
machine learning
Logic gates
Artificial Neural Networks
invasive software
integrated circuit design
high-performance hardware device
hardware trojan subspecies designing
hardware trojan
hardware devices mass-production
Hardware
gradient methods
gate-level netlist
feature extraction
electronic engineering computing
electric devices
Design Time
Benchmark testing
biblio
Security Analysis of Vehicular Ad-hoc Networks based on Attack Tree
Submitted by grigby1 on Mon, 01/21/2019 - 11:31am
tree structure
private information
pubcrawl
Resiliency
security
Security analysis
security threat
smart cities
telecommunication security
privacy
trees (mathematics)
VANET
vehicle network
vehicles
vehicular ad hoc network
vehicular ad hoc networks
vehicular ad-hoc networks
Ad Hoc Network Security
open access environment
Metrics
Logic gates
integrity
information discreet
important security requirements
data privacy
confidentiality
confidential information
Conferences
Computers
Compositionality
Availability
attack-defense tree
attack tree
biblio
Comparing Web Cache Implementations for Fast O(1) Updates Based on LRU, LFU and Score Gated Strategies
Submitted by grigby1 on Wed, 01/16/2019 - 1:37pm
runtime performance
hit rate
hypermedia
implementation
information technology
least frequently used (LFU)
least recently used (LRU)
least recently used replacement principle
LRU replacement principle
network optimization criteria
performance optimization
high user request workloads
score gated LRU
score gated polling
score gated polling (SGP)
Score Gated strategies
transport protocols
web cache implementations
Web cache strategies
web caching strategies
window LFU
cache storage
Computational modeling
pubcrawl
Metrics
Resiliency
Scalability
Complexity theory
simulation
Logic gates
Conferences
internet
data structures
microsoft windows
Windows
Web Caching
achieved hit rate performance
arbitrary score assessment
cache performance
fast O(1) updates
fast updating
biblio
Compressed Sensing based Intrusion Detection System for Hybrid Wireless Mesh Networks
Submitted by aekwall on Wed, 01/16/2019 - 1:06pm
Logic gates
wireless networks
wireless mesh networks
sparse signal reconstruction
sparse original signals
signal reconstruction
resilience
pubcrawl
power consumption
PHY layer
Peer-to-peer computing
Overhead
Metrics
Measurement
active state metric
intrusion detection system
Intrusion Detection
hybrid WMN
hybrid wireless mesh networks
high detection overhead
energy consumption
detecting intrusions
computer network security
compressive sampling
compressive sampled data
compressed sensing theory
compressed sensing
composability
biblio
Distributed Osmotic Computing Approach to Implementation of Explainable Predictive Deep Learning at Industrial IoT Network Edges with Real-Time Adaptive Wavelet Graphs
Submitted by grigby1 on Mon, 12/10/2018 - 10:41am
osmotic microservice
graph-based approach
IIoT network fog layer
IIoT systems
Industrial IoT
industrial IoT network edges
IoT development costs
large scale industrial Internet of Things
Logic gates
low-level machine language
LSTM networks
network cloud layer
graph theory
real-time
real-time adaptive wavelet graphs
real-time DSP
real-time graph-based Coiflet wavelets
real-time systems
system complexities
wavelet analysis
Wavelet Graph
wavelet transforms
XAI deep learning pre-processing applications
deep learning
Internet of Things
resilience
pubcrawl
Resiliency
Scalability
Hardware
xai
learning (artificial intelligence)
artificial intelligence deep learning problem
communication network noise
data quality
Cloud Computing
delay time
delays
digital signal processing chips
digital signal processor
distributed computing
distributed edge computing
distributed osmotic computing approach
distributed processing
edge layer
explainable artificial intelligence
biblio
Detection and Prevention of Black Hole Attacks in IOT Amp;Amp; WSN
Submitted by grigby1 on Mon, 11/19/2018 - 11:32am
smart toasters
refrigerators
resilience
Resiliency
security
selective forwarding attack
Sensor
sensors
Sinkhole attack
Smart Grid Sensors
smart grid stations
Smart Grids
pubcrawl
smartphone
Sybil attack
VANET
vulnerabilities
Wireless communication
Wireless Sensor Network
wireless sensor networks
wormhole attack
WSN
WSN network
Human behavior
autonomous cars
Base stations
black hole
Black hole attacks
body sensor networks
Compositionality
computer network security
gateway nodes
Generic Nodes
grey hole
hello flood attacks
attacks
Human Factors
internet
Internet of Everything
Internet of Things
internetworking
IoET
jamming-attack
Logic gates
network servers
PDA
biblio
Efficient Management of Certificate Revocation Lists in Smart Grid Advanced Metering Infrastructure
Submitted by grigby1 on Mon, 11/19/2018 - 11:32am
smart grid advanced metering infrastructure
power data
pubcrawl
public key cryptography
public key infrastructure
public-keys
resilience
Resiliency
Servers
Smart Grid
peer-to-peer networks
Smart Grid Sensors
Smart Grids
smart meters
smart power grids
telecommunication network management
telecommunication security
trees (mathematics)
wireless mesh networks
wireless multihop networks
Human behavior
Advanced Metering Infrastructure AMI
AMI networks
certificate revocation list
certification
Communication Network
Compositionality
distributed CRL management model
distributed hash table
distributed hash trees
advanced metering infrastructure
Human Factors
IEEE 802.11s mesh standard
key management
Logic gates
Measurement
metering
Meters
P2P networks
Peer-to-peer computing
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »