Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
computational complexity
biblio
A Modeling Method of Cyberspace Security Structure Based on Layer-Level Division
Submitted by grigby1 on Fri, 04/28/2023 - 3:59pm
network topology
level division
layer division
cyberspace security structure
policy governance
Resiliency
computer theory
graph theory
Cyberspace
computational complexity
Compositionality
collaboration
computer security
composability
Topology
Computational modeling
resilience
Metrics
Human behavior
pubcrawl
security
biblio
Improving Organizations Security Using Visual Cryptography Based on XOR and Chaotic-Based Key
Submitted by grigby1 on Fri, 04/14/2023 - 4:02pm
encryption
Organizations
pubcrawl
Metrics
resilience
Scalability
encoding
Artificial Intelligence
visualization
computational complexity
Steganography
chaotic cryptography
Resiliency
Visual Encryption
XOR operator
biblio
Accelerating Fully Homomorphic Encryption Through Microarchitecture-Aware Analysis and Optimization
Submitted by grigby1 on Thu, 06/09/2022 - 2:43pm
encryption
Cloud Computing
pubcrawl
resilience
Resiliency
Software
Scalability
microarchitecture
Metrics
Acceleration
Performance analysis
computational complexity
Homomorphic encryption
Multicore processing
Human Factors
application analysis
biblio
Evaluation of the Computational Complexity of Implementation of the Process of Adaptation of High-Reliable Control Systems
Submitted by grigby1 on Thu, 09/09/2021 - 9:02am
optimization
structural stability
structural engineering
security
Resiliency
resilience
reliability theory
pubcrawl
process control
Adaptation
Control Theory
control systems
Control System
control computer
Computers
computational complexity
composability
biblio
Minimal Information Exchange for Secure Image Hash-Based Geometric Transformations Estimation
Submitted by grigby1 on Thu, 04/08/2021 - 5:13pm
phase encoding framework
decoder estimate
distributed source coding
distributed source coding perspective
Fourier-Mellin transform
hash security
image hashing
minimal hash size
minimal information exchange
central server
Phase spectrum
reference image
rigid image registration
rigid image registration technique
secure image hash-based geometric transformations estimation
signal processing applications
transformation parameters
computational complexity
information security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Bandwidth
Cryptography
Forensics
image registration
source coding
information forensics
Image coding
secure communication
secure transmission
biblio
Safe and secure software updates on high-performance embedded systems
Submitted by grigby1 on Mon, 03/29/2021 - 11:56am
Metrics
traditional certification practices
system dependability
standards
security threats
security of data
security
secure software updates
Safety
Resiliency
resilience
regular software updates
pubcrawl
potentially infinite scenarios
post-deployment evidence
OTASU
Artificial Intelligence
interconnected system resilient
high-performance embedded systems
high performance scale
high computing demands
hardware platform
hardware complexity
extended networking technologies
embedded systems
dependable embedded systems
computational complexity
composability
certification
autonomous systems
automobiles
artificial intelligence algorithms
biblio
New Efficient QERPKC based on Partial Discrete Logarithm Problem
Submitted by aekwall on Mon, 03/22/2021 - 1:15pm
Elliptic curve cryptography
quadratic exponentiation randomized public key cryptosystem
QERPKC
QER
PDLP hardness
PDLP
partial discrete logarithm problem
exponentiation
PKC
Transmitters
public key encryption
Safety
Security analysis
computational complexity
public key cryptography
Cryptography
pubcrawl
Resiliency
Protocols
security
encryption
Scalability
biblio
Simplified Calculation of Bhattacharyya Parameters in Polar Codes
Submitted by aekwall on Mon, 03/15/2021 - 11:55am
error probability
Reliable channel
nonsystematic polar code
N polarizing channels
memoryless systems
K most reliable polarizing channels
complementary channel condition
code construction
channel reliability
calculated complexity
binary erasure channel
Bhattacharyya parameters
Bhattacharyya Parameter method
Bhattacharyya parameter
BEC channel
Maximum likelihood decoding
Resiliency
block codes
telecommunication network reliability
polar codes
error correction codes
encoding
Complexity theory
computational complexity
error statistics
channel coding
channel capacity
Reliability
Metrics
composability
pubcrawl
biblio
Transparent IFC Enforcement: Possibility and (In)Efficiency Results
Submitted by grigby1 on Thu, 03/04/2021 - 2:34pm
security lattice
programming languages
pubcrawl
real-world programs
resilience
Resiliency
Runtime
secure information flow control
Secure Multi-Execution
secure programs
security condition
polynomial time
security of data
Semantics
SME family
termination insensitive noninterference
third-party systems
transparency
transparent enforcement
transparent IFC enforcement
white-box
FlowFox browser
white box
security
black-box
black-box enforcement
Browsers
composability
computational complexity
Computer languages
efficiency
faceted secure multiexecution
White Box Security
FSME
IFC community
Information Flow Control
Lattices
memory overhead
Metrics
Multiple Facets
no-write-down no-read-up style security policy
noninterference
biblio
Fast Cross Layer Authentication Scheme for Dynamic Wireless Network
Submitted by grigby1 on Tue, 02/16/2021 - 12:47pm
dynamic wireless communication
dynamic networks
upper layer authentication
upper layer assisted method
static communications
spoofing detection
PLA models
physical layer authentication mechanisms
physical layer authentication
performance stability
network environments
lightweight cross-layer authentication scheme
hypothesis test models
fast cross layer authentication scheme
dynamic wireless network
pubcrawl
dynamic communication scenarios
cross layer authentication
authentication delay
mobile radio
wireless channels
computational complexity
radio networks
composability
Cryptographic Protocols
telecommunication security
message authentication
Resiliency
resilience
Metrics
1
2
3
4
5
6
7
8
9
…
next ›
last »