Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
outsourcing
biblio
Energy-Efficient Black Hole Router Detection in Network-on-Chip
Submitted by aekwall on Fri, 02/17/2023 - 10:44am
Energy Efficiency
Multiprocessor interconnection
Integrated circuit interconnections
HT
Energy-Efficient
black hole
BHR
outsourcing
Router Systems Security
hardware trojan
Runtime
NoC
network-on-chip
Predictive Metrics
Throughput
Resiliency
pubcrawl
biblio
A Lightweight Attribute-based Encryption Scheme for Data Access Control in Smart Grids
Submitted by grigby1 on Fri, 01/20/2023 - 5:03pm
encryption
pubcrawl
Metrics
Resiliency
data privacy
Access Control
Smart Grid
Smart Grids
Scalability
attribute-based encryption
outsourcing
Costs
data access control
computation outsourcing
Smart Grid Privacy
biblio
Secure Outsourcing of Fuzzy Linear Regression in Cloud Computing
Submitted by grigby1 on Fri, 08/26/2022 - 11:09am
tools
Cloud Computing
machine learning
security
pubcrawl
Protocols
Metrics
Linear programming
Computing Theory
outsourcing
linear regression
fuzzy linear regression
Secure computing
transformational approach
biblio
Twine: An Embedded Trusted Runtime for WebAssembly
Submitted by grigby1 on Fri, 07/29/2022 - 4:48pm
Runtime
outsourced database security
sqlite
outsourcing
SGX
Webassembly
TEE
Runtime environment
Metrics
C++ languages
Libraries
security
Databases
Cryptography
privacy
Scalability
Hardware
Software
Resiliency
resilience
Human behavior
pubcrawl
biblio
An Efficient Approach for Secure Data Outsourcing using Hybrid Data Partitioning
Submitted by grigby1 on Fri, 07/29/2022 - 4:48pm
Data Security
outsourced database security
hybrid data partitioning implementation
data sensitivity
data outsourcing
Hybrid power systems
outsourcing
cloud
Metrics
Servers
metadata
information technology
Databases
Scalability
Resiliency
resilience
Human behavior
pubcrawl
biblio
EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database Using Enclaves
Submitted by grigby1 on Fri, 07/29/2022 - 4:47pm
encryption
pubcrawl
Human behavior
resilience
Resiliency
Scalability
data privacy
Databases
Memory management
Metrics
Dictionaries
outsourcing
data warehouses
outsourced database security
biblio
Recent Developments and Methods of Cloud Data Security in Post-Quantum Perspective
Submitted by grigby1 on Thu, 07/14/2022 - 3:43pm
Cryptography
Cloud Computing
pubcrawl
Scalability
Computers
quantum computing
Data Security
Redundancy
outsourcing
Post-quantum cryptography
quantum computing security
biblio
A Primitive Cipher with Machine Learning
Submitted by grigby1 on Wed, 07/13/2022 - 1:13pm
Ciphers
machine learning
pubcrawl
Resiliency
Conferences
Cryptography
Wireless communication
resilience
Artificial Neural Networks
Scalability
Device-to-device communication
outsourcing
exponentiation
edge intelligence
mobile edge learning
biblio
PReDIHERO – Privacy-Preserving Remote Deep Learning Inference based on Homomorphic Encryption and Reversible Obfuscation for Enhanced Client-side Overhead in Pervasive Health Monitoring
Submitted by grigby1 on Tue, 05/24/2022 - 1:51pm
Metrics
sensitive data
Random mask
inference
Constrained
Computational efficiency
outsourcing
neural network
Homomorphic encryption
Compositionality
deep learning
composability
Information Assurance
Medical services
privacy
Additives
Resiliency
resilience
Human behavior
pubcrawl
biblio
SEVerity: Code Injection Attacks against Encrypted Virtual Machines
Submitted by grigby1 on Thu, 05/12/2022 - 10:50am
outsourcing
Virtualization
Virtual machining
virtual machine security
Virtual machine monitors
Resiliency
resilience
Registers
pubcrawl
privacy
virtualization privacy
Memory management
Encrypted Virtual Machines
cyber physical systems
Cryptography
composability
Code Execution Attacks
Cloud Computing
AMD SEV ES
AMD SEV
1
2
3
4
5
6
7
8
9
next ›
last »