Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Algorithm
biblio
Methods and Algorithms for Generating a Storage Key Based on Biometric Parameters
Submitted by grigby1 on Tue, 06/14/2022 - 3:15pm
neural network
Radon transform
bio key
biometrics
biometrics (access control)
Algorithm
Transforms
biometric encryption
automation
information security
Software algorithms
Metrics
Reed-Solomon codes
Access Control
Scalability
Resiliency
resilience
pubcrawl
biblio
Enhanced Security Level for Sensitive Medical Data Transmitted through Visible Light
Submitted by aekwall on Tue, 05/10/2022 - 1:45pm
wireless sensor networks
Protocols
medical devices
encryption
Wireless communication
pubcrawl
Scalability
Metrics
Resiliency
styling
Algorithm
Cipher
insert
Optical design
Optical fiber networks
Visible Light Communications Security
biblio
Fast and Efficient Chaos-Based Algorithm for Multimedia Data Encryption
Submitted by grigby1 on Thu, 05/05/2022 - 3:12pm
complexity
efficient encryption
key space
mechatronics
cyber physical system security framework
communication
Algorithm
running time
cyber physical systems
Color
tools
chaos
Streaming media
composability
Correlation
Resiliency
resilience
pubcrawl
encryption
Ciphers
biblio
Application of Cloud Modeling Technologies in Ensuring Cyber Security of APCS
Submitted by grigby1 on Thu, 09/09/2021 - 8:59am
information security
security
Resiliency
resilience
pubcrawl
process
model
Mathematical model
Large-scale systems
Algorithm
graph theory
Control Theory
Control System
Conference management
composability
automated
Analytical models
biblio
Lightweight block ciphers for resource-constrained devices
Submitted by grigby1 on Wed, 08/18/2021 - 11:15am
NIST
wireless sensor networks
Signal processing algorithms
Scalability
Resiliency
resilience
radiofrequency identification
pubcrawl
performance evaluation
Algorithm
Market research
Lightweight Encryption
Lightweight Ciphers
IoT
Cryptography
Ciphers
Block Cipher
biblio
Expert system with Fuzzy logic for protecting Scientific Information Resources
Submitted by grigby1 on Mon, 03/29/2021 - 2:04pm
Algorithm
Cyber Physical System
Databases
expert system
expert systems
Fuzzy logic
information security
Libraries
Metrics
protecting information resources
pubcrawl
resilience
Resiliency
security
Task Analysis
tools
biblio
Fast Decryption Algorithm for Paillier Homomorphic Cryptosystem
Submitted by aekwall on Mon, 02/01/2021 - 11:35am
Homomorphic encryption
storage paradigm
Scalability
Resiliency
public-key cryptosystem
pubcrawl
Paillier homomorphic encryption scheme
Paillier homomorphic cryptosystem
paillier cryptosystem
modular multiplicative arithmetic
Metrics
improved decryption process
Human Factors
Algorithm
fast decryption process
fast decryption algorithm
encryption
encrypted data
decryption speed
decryption
data privacy
Cryptography
Computational efficiency
computational cost
Complexity theory
Cathode ray tubes
biblio
Application of Differential Privacy in Location Trajectory Big Data
Submitted by grigby1 on Mon, 12/28/2020 - 12:38pm
differential privacy protection technology
social software
resilience
position trajectory
mobile Internet technology
mobile computing
Metrics
location trajectory privacy protection
location trajectory Big Data
location trajectory
location based services
internet
GPS technology
Global Positioning System
differential privacy
differential privacy protection
Data protection
data privacy
Big Data privacy protection
big data privacy
Big Data
Algorithm
Human behavior
Resiliency
Scalability
composability
pubcrawl
biblio
Enhanced dynamic cyber zone defense
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
intrusion tolerance
simulation
security of data
security
Runtime
Resiliency
pubcrawl
moving target defense
Limiting
Laboratories
Intrusion Tolrance
intrusion tolerance technique
Algorithm
information security
Heuristic algorithms
dynamic cyber zone defense
discrete-time simulation
cyber systems
cyber incidents
computer security
composability
Complexity theory
collaboration zones
biblio
Image Encryption and Decryption using Enigma Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
highly advanced technologies
secured procedure
secured image processing
Rotors
Resiliency
resilience
red intensity
pubcrawl
pixel
original RGB value
military communication
Mathematical model
image security
image encryptions
image encryption
image colour analysis
Algorithm
green intensity
enigma machine
enigma algorithm
enigma
encryption
encrypting decrypting images
efficient encryption
decryption
cyber-physical systems
Cryptography
computationally efficient procedure
composability
Breadboard
blue intensity
1
2
3
next ›
last »