Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Logic gates
biblio
Towards a secure smart grid storage communications gateway
Submitted by grigby1 on Wed, 02/21/2018 - 12:53pm
internetworking
telecommunication security
standards
smart power grids
Smart Grids
Smart Grid Privacy
security requirements
secure smart energy communications devices
Scalability
Resiliency
resilience
pubcrawl
Protocols
privacy issues
machine-to-machine communication
Logic gates
authentication
ICT system
Human Factors
Human behavior
HORIZON 2020 project STORY
hands-on configuration advice
Energy storage
Energy Efficiency
electric storage technologies
data storage
cyber-physical systems
cyber security measures
Cryptography
communications gateway
communication line security
backend M2M communications protocols
biblio
Fully integrable current-mode feedback suppressor as an analog countermeasure against CPA attacks in 40nm CMOS technology
Submitted by grigby1 on Wed, 02/21/2018 - 12:41pm
Power demand
Logic gates
Metrics
Microelectronic Security
MTD improvement
on-chip analog-level CPA countermeasure
Power Analysis Attack
power aware computing
power consumption
IoT
pubcrawl
resilience
Resiliency
sensible data security
side channel attack
size 40 nm
system-on-chip
ultraconstrained IoT smart devices
CPA
circuit feedback
CMOS
CMOS analogue integrated circuits
CMOS logic circuits
CMOS technology
composability
correlation coefficient
correlation power analysis
Analog-level
CPA attacks
CPA-resistant cryptographic devices
Cryptography
current-mode
current-mode circuits
data-dependency
fully integrable current-mode feedback suppressor
Internet of Things
biblio
A factored evolutionary optimization approach to Bayesian abductive inference for multiple-fault diagnosis
Submitted by grigby1 on Thu, 02/15/2018 - 10:46am
human factor
static fault isolation
Silicon
Resiliency
resilience
pubcrawl
Noise measurement
multiple-fault diagnosis problem
multiple fault diagnosis
Metrics
Logic gates
inference mechanisms
Human Factors
Bayes methods
Human behavior
FEA
fault trees
fault diagnosis
fault detection
factored evolutionary optimization approach
factored evolutionary algorithm
evolutionary computation
diagnostic Bayesian networks
Complexity theory
belief networks
Bayesian abductive inference
biblio
Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks
Submitted by K_Hooper on Wed, 02/14/2018 - 10:59am
SCADA network cyber-attacks
machine learning
Metrics
production engineering computing
pubcrawl
Resiliency
risk assessment
risk management
SCADA network
Logic gates
SCADA security risk assessment
SCADA systems
SCADA Systems Security
Scalability
security
security risk level
supervisory control and data acquisition
Damage Assessment
learning (artificial intelligence)
industrial systems
industrial facilities
incremental learning
Human behavior
cyber-security risk assessment model
Cyber-security
critical infrastructures
computer network security
Communications technology
belief networks
Bayesian network
Bayes methods
artificial intelligence security
Adaptation models
biblio
Augmenting Security of Internet-of-Things Using Programmable Network-Centric Approaches: A Position Paper
Submitted by grigby1 on Tue, 02/06/2018 - 1:07pm
IoT systems
Software Defined Networks
situational awareness
service-centric architecture
security of data
security
Resiliency
pubcrawl
Protocols
programmable network-centric approaches
Metrics
Logic gates
Big Data
Internet-of-Things
Internet of Things
industrial IoT systems
Home appliances
data analytics techniques
data analysis
computer architecture
composability
communications infrastructure
Cloud Computing
Big Data Analytics
biblio
Lightweight Obfuscation Techniques for Modeling Attacks Resistant PUFs
Submitted by grigby1 on Tue, 02/06/2018 - 12:55pm
message authentication
Ubiquitous Computing Security
ubiquitous computing
Support vector machines
Scalability
Resistance
Resiliency
resilience
PUF
pubcrawl
physical unclonable functions
physical unclonable function (PUF)
neural nets
Metrics
Arbiter-PUF
machine-learning
machine learning
low-cost pervasive devices
low-cost authentication
Logic gates
lightweight obfuscation
learning (artificial intelligence)
Human Factors
Human behavior
delays
authentication
Artificial Neural Networks
biblio
A Communication Security Protocol for Ubiquitous Sensor Networks
Submitted by grigby1 on Tue, 02/06/2018 - 12:54pm
Metrics
wireless sensor networks
ubiquitous sensor networks
ubiquitous network system
Ubiquitous Computing Security
ubiquitous computing
telecommunication security
security
Scalability
Resiliency
Public key
pubcrawl
Protocols
privacy
Access Credential
Medical services
Logic gates
key exchange computation process
information technology
Human Factors
Human behavior
gateway
Cryptography
cryptographic access
communication security protocol
communication protocol
cipher content
authentication
biblio
Autonomic Security for Zero Trust Networks
Submitted by grigby1 on Tue, 02/06/2018 - 12:54pm
authentication
Cloud Computing
Computer crime
Human behavior
Human Factors
Logic gates
Metrics
Organizations
pubcrawl
Resiliency
Scalability
Time factors
Ubiquitous Computing Security
biblio
A multi-factors security key generation mechanism for IoT
Submitted by grigby1 on Fri, 02/02/2018 - 12:14pm
multi-factors
self-organising network
self-organising Internet of Things network
self-adjusting systems
security of data
security
Resiliency
pubcrawl
Protocols
multifactors security key generation mechanism
Multi-Level Security
Ad Hoc Network Security
Logic gates
IoT security
IoT nodes
IoT
Internet of Things
Human Factors
Human behavior
Cryptography
composability
Ad hoc networks
biblio
Secure RAID schemes for distributed storage
Submitted by K_Hooper on Fri, 02/02/2018 - 10:04am
Logic gates
B codes
Complexity theory
computational complexity
computer architecture
Decoding
decoding complexities
Distributed databases
distributed storage
eavesdropping nodes
encoding
EVENODD codes
Generators
information theory
information-theoretic security
XOR-based systematic secure RAID schemes
low-complexity schemes
node failures
optimal encoding complexities
practical high rate regime
pubcrawl
RAID
RAID architecture
random access
Reed-Solomon codes
Reliability
Resiliency
Resilient Security Architectures
Systematics
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
…
next ›
last »