Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Algorithm
biblio
Application of Differential Privacy in Location Trajectory Big Data
Submitted by
grigby1
on Mon, 12/28/2020 - 11:38am
differential privacy
pubcrawl
composability
Scalability
Resiliency
Human behavior
Algorithm
Big Data
big data privacy
Big Data privacy protection
data privacy
Data protection
differential privacy protection
differential privacy protection technology
Global Positioning System
GPS technology
internet
location based services
location trajectory
location trajectory Big Data
location trajectory privacy protection
Metrics
mobile computing
mobile Internet technology
position trajectory
resilience
social software
biblio
Enhanced dynamic cyber zone defense
Submitted by
aekwall
on Mon, 07/27/2020 - 11:12am
Algorithm
collaboration zones
Complexity theory
composability
computer security
cyber incidents
cyber systems
discrete-time simulation
dynamic cyber zone defense
Heuristic algorithms
information security
intrusion tolerance
intrusion tolerance technique
Intrusion Tolrance
Laboratories
Limiting
moving target defense
pubcrawl
Resiliency
Runtime
security
security of data
simulation
biblio
Image Encryption and Decryption using Enigma Algorithm
Submitted by
grigby1
on Fri, 06/26/2020 - 11:44am
Algorithm
blue intensity
Breadboard
composability
computationally efficient procedure
Cryptography
cyber-physical systems
decryption
efficient encryption
encrypting decrypting images
encryption
enigma
enigma algorithm
enigma machine
green intensity
highly advanced technologies
image colour analysis
image encryption
image encryptions
image security
Mathematical model
military communication
original RGB value
pixel
pubcrawl
red intensity
resilience
Resiliency
Rotors
secured image processing
secured procedure
biblio
Agile Release Planning Using Natural Language Processing Algorithm
Submitted by
aekwall
on Mon, 05/18/2020 - 9:54am
Scalability
Software
Resiliency
Human behavior
pubcrawl
Planning
natural language processing
software engineering
software development management
Java
Software algorithms
Currencies
Algorithm
project management
agile methodology
agile release planning
complex software engineering projects
Java utility
JIRA
natural language processing algorithm
project release
provided user stories
R Programming
Rally
Release Planning
RV coefficient NLP algorithm
similar user stories
software prototyping
team working
user story
word corpus
biblio
Research on LED lightweight cryptographic algorithm based on RFID tag of Internet of things
Submitted by
aekwall
on Mon, 03/23/2020 - 12:33pm
Algorithm
Boolean expression reconstruction
Boolean functions
Ciphers
Cryptography
Differential Power Analysis
DPA attack
DPA protection technology threshold
field programmable gate arrays
FPGA
Human behavior
Internet of Things
InvS-box
LED lightweight cryptographic algorithm
LED lightweight cryptography
light emitting diodes
Piccolo cryptographic algorithm
pubcrawl
radio frequency identification tags
radiofrequency identification
Resiliency
RFID tag
RFID tag chip
RFID tags
RFIDs
search problems
biblio
Modification and Optimization of Solovey-Strassen's Fast Exponentiation Probablistic Test Binary Algorithm
Submitted by
aekwall
on Mon, 01/20/2020 - 10:48am
Algorithm
binary exponentiation
Cryptography
C\# languages
C\# programming language
exponentiation
Fermat
Fermat's little theorem
Information systems
Jacobi symbol
Jacobian matrices
optimization
Probabilistic logic
probability
probability test
pubcrawl
Resiliency
Scalability
Software algorithms
Solovey-Strassen
Solovey-Strassen fast exponentiation probablistic test binary algorithm
test
biblio
Fake news detector algorithm works better than a human
Submitted by
willirn1
on Tue, 09/10/2019 - 3:22pm
Algorithm
Articles of Interest
C3E 2019
Cognitive Security
Cognitive Security in Cyber
fake news
Cognitive Security
Articles of Interest
C3E 2019
biblio
Learning about Cyber Deception through Simulations: Predictions of Human Decision Making with Deceptive Signals in Stackelberg Security Games
Submitted by
Katie Dey
on Mon, 09/09/2019 - 9:36pm
ACT-R
Algorithm
Articles for Review
C3E 2019
Cognitive Architecture
Cognitive Security
Computer simulation
deception
Instance-based learning
Mind
Cognitive Security
Articles for Review
C3E 2019
biblio
Diversity and Serendipity in Recommender Systems
Submitted by
grigby1
on Thu, 05/24/2018 - 11:10am
Algorithm
Human behavior
Human Factors
pubcrawl
recommender system
recommender systems
reranking
resilience
Resiliency
Scalability
biblio
Generated Un-detectability Covert Channel Algorithm for Dynamic Secure Communication Using Encryption and Authentication
Submitted by
grigby1
on Tue, 12/12/2017 - 12:28pm
advanced encryption standard
Algorithm
authentication
Compositionality
confidentiality
covert channel
covert channels
Cryptography
cryptography algorithms
dynamic secure communication
dynamically
encryption
fake key
generated un-detectability covert channel algorithm
hashed message authentication code
Heuristic algorithms
message authentication
Protocols
pubcrawl
Resiliency
Scalability
Servers
telecommunication channels
telecommunication security
un-detectability
1
2
3
next ›
last »