Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
computational complexity
biblio
Approximate Probabilistic Security for Networked Multi-Robot Systems
Submitted by
grigby1
on Thu, 12/17/2020 - 12:38pm
approximate probabilistic security
binary decision diagrams
Boolean functions
combinatorial optimization problem
computational complexity
control system security
disjoint path sets
exact probability
graph theory
Human behavior
Human Factors
left invertiblility
lower bound estimate
MRS
multi-robot systems
multipoint optimization
networked control systems
networked multirobot systems
Observers
online optimization
optimal subset
optimisation
policy-based governance
Probabilistic logic
probability
pubcrawl
resilience
Resiliency
robot operating systems
Robot sensing systems
security
biblio
GCSA Codes with Noise Alignment for Secure Coded Multi-Party Batch Matrix Multiplication
Submitted by
grigby1
on Tue, 12/15/2020 - 12:27pm
batch processing
codes
coding theory
colluding servers
Compositionality
computational complexity
computer network security
Cross Subspace Alignment codes
Cryptography
flexible interserver network topology
GCSA codes
GCSA-NA
master gains no additional information
matrix multiplication
Metrics
network servers
noise alignment
pairwise products
polynomial sharing
polynomials
pubcrawl
resilience
Resiliency
secure interserver communication
secure multiparty batch matrix multiplication problem
security
SMBMM
synchronisation
telecommunication network topology
biblio
Particle Swarm Optimization Algorithm with Variety Inertia Weights to Solve Unequal Area Facility Layout Problem
Submitted by
aekwall
on Mon, 12/14/2020 - 11:38am
Conferences
pubcrawl
composability
simulation
convergence
particle swarm optimisation
Swarm Intelligence
particle swarm optimization
particle swarm optimization algorithm
Production
Analytical models
computational complexity
Compositionality
Layout
Swarm intelligence algorithm
PSO algorithm
dynamic inertia weight
facilities layout
Inertia Weight
nonlinear inertia weight
NP-hard problem
UA-FLPP
unequal area facility layout problem
workshop area utilization
biblio
C500-CFG: A Novel Algorithm to Extract Control Flow-based Features for IoT Malware Detection
Submitted by
grigby1
on Fri, 12/11/2020 - 1:34pm
C500-CFG
C500-CFG algorithm
computational complexity
computer network security
control flow graph
control flow-based features
decom-piled executable codes
Ding's NP-hard problem
dynamic programming
feature extraction
feature information
graph theory
high-complexity programs
Human behavior
Internet of Things
invasive software
IoT
IoT malware detection
malicious code
Malware Analysis
malware detection
Metrics
privacy
pubcrawl
resilience
Resiliency
static characteristic extraction method
text analysis
text-based methods
biblio
Cyber-Physical Interdependencies in Power Plant Systems: A Review of Cyber Security Risks
Submitted by
grigby1
on Tue, 10/06/2020 - 12:50pm
advanced communication technologies
Analytical models
communication direction
computational complexity
Computational modeling
Computing Theory
control parameters
critical infrastructure
cyber security risks
Cyber-physical attacks
cyber-physical interdependencies
cyber-physical systems
digital transformation process
graph theory
graph-based models
interdependent connections
Metrics
modern computing
network topology
network-based models
power engineering computing
power generation
power plant systems
power plants
pubcrawl
Reliability
research target
Safety
Security Metrics
security of data
smart cities
Smart City
Smart Grid
system components
Topology
biblio
Trust-Region Minimization Algorithm for Training Responses (TRMinATR): The Rise of Machine Learning Techniques
Submitted by
grigby1
on Mon, 10/05/2020 - 1:11pm
approximation theory
computational complexity
computer architecture
computer theory
deep learning
Europe
gradient descent methods
gradient methods
Hessian approximations
Hessian matrices
Hessian matrix inversion
Human Factors
learning (artificial intelligence)
limited memory BFGS quasiNewton method
Limited-memory BFGS
Line-search methods
machine learning
matrix inversion
memory storage
Neural networks
Newton method
nonconvex functions
optimisation
optimization
pubcrawl
Quasi-Newton methods
resilience
Resiliency
Scalability
security
Signal processing algorithms
storage management
Training
training responses
TRMinATR
Trust-region methods
trust-region minimization algorithm
biblio
On the Impact of Trusted Nodes in Resilient Distributed State Estimation of LTI Systems
Submitted by
grigby1
on Mon, 10/05/2020 - 1:10pm
attack-prone environment
attack-resilient algorithm
communication-link augmentation
computational complexity
computer network security
computer theory
Heuristic algorithms
Human Factors
linear dynamical process
Linear systems
LTI systems
Measurement
NP-hard
provably-correct distributed state estimation algorithm
pubcrawl
Redundancy
resilience
Resiliency
resilient distributed state estimation
Robustness
Scalability
security
sensors
set theory
state estimation
Trusted Computing
trusted nodes
biblio
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
Submitted by
aekwall
on Tue, 09/08/2020 - 9:12am
Cryptography
encryption
Classification algorithms
Resiliency
pubcrawl
composability
NIST
computational complexity
Information systems
Constrained Devices
Ciphers
stream cipher
information technology
Predictive Metrics
chaotic communication
chaotic system
chaotic cryptography
data communication
lightweight cryptography
2D logistic map
block ciphers
cipher algorithm
cryptography algorithms PRESENT
generated sequence keys
hybrid modified lightweight algorithm
NIST suite
pseudorandom keys
Salsa20
symmetric cipher
symmetric encryption
traditional cryptography algorithms
biblio
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption
Submitted by
grigby1
on Fri, 09/04/2020 - 3:16pm
encryption
authorisation
data privacy
computational complexity
private key cryptography
pubcrawl
composability
Metrics
Resiliency
resilience
Decoding
attribute-based encryption
Identity-based encryption
A-IBE scheme
Accountable authority
authority identity-based encryption
black-box security
ciphertexts
decoder box
dummy identity-based encryption
full black-box security
generic construction
malicious private key generator
token-based identity-based encryption
underlying TB-IBE scheme
user decryption
user identity
user privacy security
user private key
black box encryption
biblio
CPSS: CP-ABE based Platoon Secure Sensing Scheme against Cyber-Attacks
Submitted by
grigby1
on Fri, 07/24/2020 - 11:41am
pubcrawl
Access Control
access control structure
authorisation
Cloud Computing
collaboration
computational complexity
CP-ABE
CP-ABE based platoon
CPSS
Cryptography
cyber-attacks
cyphertext-policy attribute-based encryption
distance fluctuations
driving applications
encryption
Gold
key distribution process
life-threatening accidents
LTE-V2X
malicious attacks
platoon key
platoon maneuvers
platoon secure sensing scheme
platoon stability
policy-based governance
polynomial time solution
position information
Public key
Safety
Scalability
security insurance
sensing data
sensors
Stability analysis
traffic efficiency
traffic engineering computing
Veins platform
1
2
3
4
5
6
7
8
9
next ›
last »