Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Resilient
biblio
Mc-PUF: Memory-based and Machine Learning Resilient Strong PUF for Device Authentication in Internet of Things
Submitted by aekwall on Thu, 12/01/2022 - 3:37pm
Measurement
security
Predictive models
authentication
pubcrawl
Resiliency
machine learning
Random access memory
Physical Unclonable Function
Resilient
Constrained Devices
Germanium
Mc-PUF
modeling attack
Resilient Security Architectures
biblio
Enterprise Architecture Frameworks Assessment: Capabilities, Cyber Security and Resiliency Review
Submitted by aekwall on Fri, 02/04/2022 - 9:34am
Resilient Security Architectures
Buildings
capabilities
Companies
Complexity theory
Computer crime
cyber security requirement
Cybersecurity
data analysis
Enterprise Architecture
information technology
NIST
pubcrawl
Resiliency
Resilient
security architecture framework
biblio
Algebraic Cryptanalysis of O'zDSt 1105:2009 Encryption Algorithm
Submitted by grigby1 on Tue, 05/25/2021 - 2:26pm
Human Factors
Task Analysis
standards
Scalability
Resilient
resilience
pubcrawl
O'zDSt 1105:2009
Metrics
information science
Algebraic cryptanalysis
Human behavior
encryption
diamatrix
decomposition
cryptology
composability
Communications technology
collaboration
Ciphers
biblio
Analysis of Subject Recognition Algorithms based on Neural Networks
Submitted by grigby1 on Tue, 05/25/2021 - 2:25pm
pubcrawl
Training
Text recognition
Task Analysis
Software algorithms
Software
simplest perceptron
Scalability
Resilient
resilience
artificial neural network
Pattern recognition
Metrics
information science
Human Factors
Human behavior
cryptology
composability
collaboration
Artificial Neural Networks
biblio
Application of the Aho-Corasick algorithm to create a network intrusion detection system
Submitted by grigby1 on Tue, 05/25/2021 - 2:25pm
Memory management
Throughput
Scalability
Resilient
resilience
pubcrawl
precise matching
pattern matching
NIDS
network intrusion detection
Metrics
algorithm Aho-Corasick
information science
imprecise matching
Human Factors
Human behavior
Hardware
FPGA
field programmable gate arrays
cryptology
composability
collaboration
biblio
An Optimized Structure of State Channel Network to Improve Scalability of Blockchain Algorithms
Submitted by grigby1 on Tue, 05/25/2021 - 2:24pm
information security
Upper bound
state channel
second layer network
Scalability
Routing
Resilient
resilience
pubcrawl
Metrics
Lightning Network
blockchain
Human Factors
Human behavior
cryptology
Cryptography
cryptocurrency
composability
collaboration
channel capacity
blockchain scalability
biblio
Efficient Implementation of HashSieve Algorithm for Lattice-Based Cryptography
Submitted by grigby1 on Tue, 05/25/2021 - 2:24pm
Prediction algorithms
SVP
standards
software libraries
Software algorithms
Software
sieving algorithms
Scalability
Resilient
resilience
pubcrawl
collaboration
modular software
Metrics
Lattices
lattice-based cryptography
Human Factors
Human behavior
HashSieve
cryptology
Cryptography
composability
biblio
Protection of Personal Data Transmitted via Web Service Against Software Developers
Submitted by grigby1 on Tue, 05/25/2021 - 2:24pm
masking
web services
Software
security
Scalability
Resilient
resilience
pubcrawl
Protection of Personal Data
privacy by design
Metrics
anonymization
information security
IEEE Sections
Human Factors
Human behavior
Databases
cryptology
Cryptography
composability
collaboration
biblio
B-DCT based Watermarking Algorithm for Patient Data Protection in IoMT
Submitted by grigby1 on Tue, 05/25/2021 - 2:23pm
internet
Watermarking
sensors
Scalability
Resilient
resilience
pubcrawl
Metrics
Medical diagnostic imaging
internet of medical things
collaboration
Human Factors
Human behavior
Filtering
discrete wavelet transforms
discrete cosine transforms
discrete cosine transformation
Data protection
cryptology
composability
biblio
Efficient Post-quantum Identity-based Encryption with Equality Test
Submitted by grigby1 on Tue, 05/25/2021 - 2:22pm
Metrics
Wireless communication
testing
standards
standard model
smart cities
Scalability
Resilient
resilience
Public key
pubcrawl
CCA2
Learning with errors
Lattices
lattice-based cryptography
Identity-based encryption
IBE with equality test
Human Factors
Human behavior
cryptology
composability
collaboration
1
2
next ›
last »