Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Logistics
biblio
Multi image cross hybrid encryption method based on combined chaotic system
Submitted by grigby1 on Thu, 06/30/2022 - 5:05pm
encryption
Logistics
security
pubcrawl
resilience
Resiliency
Scalability
Metrics
chaos
smart cities
chaotic cryptography
combined chaotic system
cross mixing
encryption method
multiple images
biblio
Waveform Vector Embedding for Incipient Fault Detection in Distribution Systems
Submitted by aekwall on Fri, 05/06/2022 - 12:57pm
Support vector machines
machine learning
Conferences
power systems
pubcrawl
Resiliency
Power system protection
Compositionality
Logistics
Dictionaries
fault detection
electrical fault detection
incipient fault
waveform dictionary
waveform vector
expandability
biblio
Why Security Defects Go Unnoticed During Code Reviews? A Case-Control Study of the Chromium OS Project
Submitted by grigby1 on Mon, 04/18/2022 - 2:36pm
Chromium
code review
Computer bugs
Human behavior
Logistics
Open Source Software
policy-based governance
pubcrawl
quality assurance
resilience
Resiliency
security
security weaknesses
software engineering
Vulnerability
biblio
A Functional Approach to Cyber Risk Assessment
Submitted by grigby1 on Mon, 04/18/2022 - 10:57am
Complexity theory
cyber risk assessment
estimation
Human Factors
information security
logistic function
Logistics
Metrics
Organizations
pubcrawl
quantitative methods
resilience
risk management
Scalability
Security Risk Estimation
tools
biblio
Vulnerability Exploiting SMS Push Notifications
Submitted by grigby1 on Wed, 03/09/2022 - 1:40pm
information security
Logistics
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Metrics
password
Mobile handsets
multifactor authentication
Multi-factor authentication
SMS
codes
Asia
Password Reset
biblio
An Organizational Structure for the Thing-User Community Formation
Submitted by grigby1 on Mon, 11/29/2021 - 1:32pm
Collaborative Work
convergence
Human Factors
information and communication technology
Intelligent Agents
Knowledge engineering
Logistics
organizational structure
pubcrawl
Scalability
Social Agents
social networking (online)
thing-user
thing-user centric communication
thing-user community formation
thing-user social community
biblio
FengHuoLun: A Federated Learning based Edge Computing Platform for Cyber-Physical Systems
Submitted by aekwall on Mon, 10/04/2021 - 2:06pm
Resiliency
Pervasive Computing Security
trustworthy
Logistics
federated learning
Biological system modeling
microservices
testing
cyber-physical systems
Computational modeling
Metrics
Scalability
pubcrawl
Servers
edge computing
Cloud Computing
Human Factors
biblio
Multi-Core Implementation of Chaotic RGB-LSB Steganography Technique
Submitted by grigby1 on Thu, 09/30/2021 - 11:08am
Metrics
chaos
chaotic communication
chaotic map
encryption
Image color analysis
Instruction sets
Logistics
LSB steganography
security
multicore computing security
NIST suite
OpenMP
Performance measurement
pubcrawl
resilience
Resiliency
Scalability
biblio
Protocols Over Things: A Decentralized Programming Model for the Internet of Things
Submitted by grigby1 on Fri, 09/17/2021 - 10:46am
Metrics
Science of Security
Scalability
Resiliency
resilience
pubcrawl
Protocols
programming
policy-based governance
autonomous systems
Logistics
Internet of Things
Intelligent systems
Human behavior
Decision Making
Correlation
composability
collaboration
biblio
CrypTFlow: Secure TensorFlow Inference
Submitted by aekwall on Mon, 03/15/2021 - 12:11pm
compiler security
TensorFlow inference code
semihonest security
semihonest MPC protocol
Secure TensorFlow inference
secure multiparty computation protocols
Porthos
plaintext TensorFlow
malicious security
malicious secure MPC protocols
inference accuracy
improved semihonest 3-party protocol
ImageNet dataset
end-to-end compiler
CrypTFlow
Aramis
Scalability
program compilers
Compositionality
inference mechanisms
Benchmark testing
public key cryptography
Logistics
Metrics
Cryptography
pubcrawl
Resiliency
Task Analysis
Protocols
Cryptographic Protocols
Hardware
data privacy
1
2
3
4
5
6
next ›
last »