Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Three-dimensional displays
biblio
Speech and Audio Cryptography System using Chaotic Mapping and Modified Euler's System
Submitted by
aekwall
on Mon, 11/25/2019 - 1:09pm
Cryptography
encryption
Conferences
Resiliency
pubcrawl
composability
information technology
Predictive Metrics
chaos
chaotic communication
Three-dimensional displays
chaotic cryptography
2D mapping function
3D mapping function
audio cryptography system
audio file
audio signal processing
Chaotic Mapping
euler numerical resolution
Henon mapping
Lorenz 3D mapping
modified Euler system
speech coding
speech cryptography
Two dimensional displays
biblio
Hardware Implementation of A Chaotic Pseudo Random Number Generator Based on 3D Chaotic System without Equilibrium
Submitted by
aekwall
on Mon, 11/25/2019 - 1:09pm
field programmable gate arrays
Cryptography
Hardware
embedded systems
Resiliency
pubcrawl
composability
Mathematical model
Generators
random number generation
Predictive Metrics
chaotic communication
3D chaotic flows
3D chaotic system
chaotic based digital systems
chaotic behaviors
chaotic dynamics
chaotic pseudorandom number generator
cryptography systems
deterministic chaotic systems
digital communication
digital communication systems
dynamical behavior
Dynamical Systems
Hardware Implementation
lightweight systems
low computational overhead
low-cost chaotic hardware
low-cost hardware platforms
simple nonlinear systems
three-dimensional chaotic flows
Three-dimensional displays
chaotic cryptography
biblio
Performance Analysis of Symmetric Key Cryptographic Algorithms
Submitted by
grigby1
on Tue, 10/15/2019 - 1:45pm
3DES
AES
avalanche effect
battery consumption
Blowfish
composability
Cryptography
customers requirement
datas security
Data Transmission
decryption time
DES
ECB
encryption
encryption time
energy consumption
Human behavior
internet secure
Java
Memory management
memory usage
Metrics
online data exchange
Performance analysis
practical implementation
pubcrawl
Repudiation
resilience
Resiliency
secure data transfers
secure payment
Signal processing algorithms
Symmetric key algorithms
symmetric key cryptographic algorithms
Three-dimensional displays
Throughput
transactions
unauthorized people
biblio
A Comparative Analysis of Visualisation Techniques to Achieve Cyber Situational Awareness in the Military
Submitted by
grigby1
on Thu, 03/28/2019 - 2:13pm
security
security of data
tools
resilience
pubcrawl
Metrics
Resiliency
composability
military computing
military communication
Servers
Three-dimensional displays
Comparative Analysis
Security Metrics
data visualisation
Data visualization
cyber situational awareness
situational awareness
3D Operational Picture
3D visualization
Belgium
cyber common operational picture
cyber defence implications
cyber defense situational awareness
Cyber Hybrid Situational Awareness
CyCOP
CyHSA
Information systems
military commanders
operational picture
Royal Military Academy
visualisation techniques
biblio
Digital Audio Signature for 3D Printing Integrity
Submitted by
grigby1
on Mon, 01/21/2019 - 11:28am
Acoustic Fingerprints
Acoustics
additive manufacturing
composability
cyber security
Human behavior
printers
pubcrawl
Resiliency
security
side channels
Solid modeling
Three-dimensional displays
three-dimensional printing
biblio
Augmented Reality in Human-Robot Cooperative Search
Submitted by
grigby1
on Mon, 11/19/2018 - 11:14am
augmented reality
Biomedical monitoring
field environments
Human behavior
human teammate
human-robot cooperative search
human-robot interaction
intelligent robots
mobile robots
Monitoring
navigation
Portable computers
privacy
pubcrawl
resilience
Resiliency
robot vision
robots
Scalability
situational awareness
Three-dimensional displays
biblio
Parallel Reconstruction of Three Dimensional Magnetohydrodynamic Equilibria in Plasma Confinement Devices
Submitted by
grigby1
on Thu, 08/23/2018 - 10:59am
privacy
cyber-physical systems
pubcrawl
Resiliency
composability
formal analysis
Mathematical model
resilience
Force
Three-dimensional displays
Nickel
Cray XC30 supercomputer
data parallelism
fusion data
Magnetohydrodynamics
parallel algorithms
parallel reconstruction
parallel V3FIT
plasma confinement devices
plasma equilibria
plasma magnetohydrodynamics
plasma simulation
plasma toroidal confinement
stellarators
three dimensional magnetohydrodynamic equilibria
three dimensional plasma equilibrium reconstructions
three dimensional plasma reconstruction code
Tokamak devices
tokamaks
confinement
biblio
Rethinking the High Capacity 3D Steganography: Increasing Its Resistance to Steganalysis
Submitted by
grigby1
on Tue, 05/01/2018 - 10:33am
3D shape
3D steganography
composability
Data mining
distortion
Face
Hamiltonian path quantization
high capacity 3D steganographic method
Image edge detection
Information hiding
Mathematical model
Metrics
privacy
pubcrawl
Resistance
shape distortion
steganalysis
Steganography
steganography detection
stereo image processing
Three-dimensional displays
biblio
A Multiple Paths Scheme with Labels for Key Distribution on Quantum Key Distribution Network
Submitted by
grigby1
on Wed, 04/11/2018 - 2:03pm
combined security proportion
composability
multiple paths scheme
multiple paths scheme with labels
probability
probability model
pubcrawl
quantum cryptography
quantum key distribution network
resilience
Resiliency
Scalability
Stochastic processes
strategy of stochastic paths with labels
Three-dimensional displays
Topology
Trust Routing
trusted relay
universal net topologies
biblio
Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms
Submitted by
grigby1
on Mon, 04/02/2018 - 11:48am
3DES
AES
Asymmetric Encryption
Blowfish
Ciphers
Classification algorithms
Cloud Computing
Compositionality
Cryptography
decryption
DES
Diffie-Hellman and RSA
DSA
elliptic curve
encryption
Human behavior
Metrics
private and public key encryption
pubcrawl
Public key
resilience
Resiliency
standards
Three-dimensional displays
1
2
3
next ›
last »