Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Information systems
biblio
Adversarial multiple access channels and a new model of multimedia fingerprinting coding
Submitted by grigby1 on Tue, 02/23/2021 - 1:35pm
security of data
security
pubcrawl
Metrics
resilience
Resiliency
Conferences
Mathematical model
privacy
composability
encoding
Information systems
Receivers
Binary codes
broadcast channels
channel coding
error statistics
network coding
compressed sensing
Watermarking
multimedia computing
adders
Multimedia communication
A-channel
adversarial multiple access channels
arbitrary coefficients
binary adder channel
collusion attack
digital fingerprint
digital fingerprinting code
digital fingerprinting coding problems
linear combinations
malicious multiple access channels
multi-access systems
multimedia fingerprinting code
multiple access channel
noise-like signals
zero-error probability
biblio
Software Development of Electronic Digital Signature Generation at Institution Electronic Document Circulation
Submitted by aekwall on Mon, 02/08/2021 - 12:45pm
Scalability
Cryptography
Software
Resiliency
pubcrawl
blockchain
software engineering
software development
digital signatures
Information systems
RSA
document handling
DSA
electronic digital signature
Consumer electronics
ECDSA
blockchain storage
blockchain storage of electronic signatures
central Web-server
cryptographic module
documented information exchanging
electronic digital signature generation
electronic document circulation
GOST RF Standard 34.10–2018
institution electronic document circulation
secure key storage
software tools
Web-interface
biblio
Experiment Design for Complex Immersive Visualisation
Submitted by grigby1 on Wed, 02/03/2021 - 12:11pm
immersive systems
composability
cyber physical systems
cyber warfare
data analysis
Data visualization
Human behavior
human computer interaction
Human Factors
Information systems
military communication
military computing
network forensics
privacy
pubcrawl
resilience
software performance
tools
visualisation
biblio
Enhancing Resilience of Deep Learning Networks By Means of Transferable Adversaries
Submitted by grigby1 on Thu, 01/28/2021 - 12:10pm
Adversarial training
Adversary Models
Artificial Neural Networks
classification decision model
deep learning
deep learning networks
defense methods
Human behavior
Information systems
learning (artificial intelligence)
machine learning
Metrics
Multi-step Adversaries
neural nets
Neural networks
pattern classification
Perturbation methods
pubcrawl
resilience
resilience enhancement
Resiliency
Scalability
security of data
single-step adversaries
Task Analysis
Training
transferable adversaries
biblio
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
Submitted by grigby1 on Fri, 01/22/2021 - 12:51pm
chaotic cryptography
pubcrawl
2D logistic map
block ciphers
chaotic communication
chaotic system
cipher algorithm
Ciphers
Classification algorithms
computational complexity
Constrained Devices
Cryptography
cryptography algorithms PRESENT
data communication
encryption
generated sequence keys
hybrid modified lightweight algorithm
Information systems
information technology
lightweight cryptography
NIST
NIST suite
pseudorandom keys
Salsa20
stream cipher
symmetric cipher
symmetric encryption
traditional cryptography algorithms
biblio
Dynamic Model of Cyber Defense Diagnostics of Information Systems With The Use of Fuzzy Technologies
Submitted by aekwall on Mon, 01/18/2021 - 10:34am
cyberattack
Scalability
Cryptography
Task Analysis
information security
Resiliency
pubcrawl
Metrics
Cybersecurity
Trojan horses
Fuzzy logic
probability
fuzzy set theory
security level
Information systems
information system
cyberattacks
differential equations
cryptographic level
cyber defense diagnostics
cyber defense systems
cyberattack intensity
cybersecurity status
delayed differential equation theory
dynamic model
fuzzy function
fuzzy technologies
information activity
logical fuzzy function
membership function
negative consequence probability
probability distribution density.
security status diagnosis
Fuzzy Cryptography
biblio
Interledger for the Industrial Internet of Things
Submitted by grigby1 on Tue, 12/01/2020 - 1:01pm
blockchain
distributed ledger technologies
Distributed Ledger Technology
hierarchical information flow
Human behavior
human trust
industrial information systems
industrial internet
Industrial Internet of Things
information exchange
Information systems
Internet of Things
Internet-of-Things devices
ledger technology
manufacturing systems
production engineering computing
pubcrawl
smart grid security
socio-economic effects
biblio
Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model Enhancement
Submitted by grigby1 on Fri, 11/20/2020 - 1:27pm
Access Control
access control policies management
access control policy
access control service
Anomalies Correlation
authorisation
Correlation
correlation links
Database Security
Databases
information system security
Information systems
model enhancement
policy-based governance
pubcrawl
RBAC
risk assessment
risk assessment approach
risk assessment model
risk management
Security Policies Analysis
security risks
Servers
biblio
Security Requirements for Cloud-based C4I Security Architecture
Submitted by grigby1 on Fri, 11/20/2020 - 1:25pm
Cloud Computing
cloud computing system
cloud computing technology
cloud-based C4I security architecture
Cloud-based C4I Security Requirements
command and control systems
computer security
Information systems
Korea Military
Korea national defense information system
military computing
national defense command control system
national innovation
policy-based governance
pubcrawl
public sector
secure security architecture
security of data
Security Policies Analysis
security requirements
security vulnerabilities
Servers
Task Analysis
US military
biblio
An Resilient Cloud Architecture for Mission Assurance
Submitted by aekwall on Mon, 11/16/2020 - 1:50pm
security of data
Monitoring
Cloud Computing
computer architecture
pubcrawl
Planning
Information systems
resilience
information system
Information services
cyber threat
Mission Assurance
complex cyber threat environment
cyber physical environment
dual loop architecture
environment awareness network
mission assurance system deployment mechanism
perception analysis planning adjustment
resilient cloud
resilient cloud architecture
resilient cloud environment
resilient dual loop architecture
resource planning
resource situation generation
Resiliency
Resilient Security Architectures
1
2
3
4
5
6
7
8
next ›
last »