Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
i-o systems security
biblio
An Adaptive Erasure-Coded Storage Scheme with an Efficient Code-Switching Algorithm
Submitted by grigby1 on Wed, 09/01/2021 - 2:15pm
adaptive scheme
code switch
Computational efficiency
Conferences
degraded read
distributed computing
erasure code
fault tolerance
Fault tolerant systems
i-o systems security
pubcrawl
Scalability
Switches
telecommunication traffic
biblio
Anomaly Detection for Science DMZs Using System Performance Data
Submitted by grigby1 on Wed, 09/01/2021 - 2:15pm
Anomaly Detection
clustering
computer security
data transfer node
DBSCAN
DoS attack
high-performance computing
i-o systems security
machine learning
pubcrawl
Scalability
Science DMZ
scientific workflows
system performance metrics
biblio
Real-time Scheduling of I/O Transfers for Massively Parallel Processor Arrays
Submitted by grigby1 on Wed, 09/01/2021 - 2:14pm
arrays
data transfer
i-o systems security
indexing
parallel processing
Processor scheduling
pubcrawl
real-time systems
Scalability
Schedules
biblio
Verified Hardware/Software Co-Assurance: Enhancing Safety and Security for Critical Systems
Submitted by grigby1 on Wed, 09/01/2021 - 2:14pm
data structures
filtering algorithms
Hardware
i-o systems security
pubcrawl
Safety
Scalability
Software
Software algorithms
Unmanned Aerial Vehicles
biblio
A Design Implementation and Comparative Analysis of Advanced Encryption Standard (AES) Algorithm on FPGA
Submitted by grigby1 on Wed, 09/01/2021 - 2:14pm
Advanced Encryption Standard (AES) Algorithm
Artix-7 FPGA
encryption
field programmable gate arrays
Field Programmable Gate Arrays (FPGA)
Hardware
i-o systems security
Input/Output (I/O) and Global Buffer (BUFG)
Look Up Tables (LUTs)
pubcrawl
Registers
Scalability
Slice Register (SR)
standards
Table lookup
biblio
Virtual Environment for Researching Information Security of a Distributed ICS
Submitted by grigby1 on Wed, 09/01/2021 - 2:13pm
Computational modeling
i-o systems security
information security
integrated circuits
process control
Protocols
pubcrawl
SCADA systems
Scalability
Software
supervisory control and data acquisition (SCADA) systems
Virtual Testbed
biblio
Presenting IoT Security based on Cryptographic Practices in Data Link Layer in Power Generation Sector
Submitted by grigby1 on Wed, 09/01/2021 - 2:13pm
IoT
Scalability
SCADA
RSA
Reliability
pubcrawl
power generation
PLC
optimization
NTPC.
AES
Internet of Things
I/O
i-o systems security
DES
DDCMIS
DCS
Cryptography
control systems
biblio
Architecting a Secure Wireless Interconnect for Multichip Communication: An ML Approach
Submitted by grigby1 on Wed, 09/01/2021 - 2:13pm
Communication system security
computer architecture
Hardware
i-o systems security
Jamming
Media Access Protocol
mm-wave
multichip
NoC
pubcrawl
Scalability
security
wireless
Wireless communication
biblio
An Efficient Database Backup and Recovery Scheme using Write-Ahead Logging
Submitted by grigby1 on Tue, 08/31/2021 - 11:06am
Human behavior
Write-Ahead Logging
Resiliency
resilience
relational database security
pubcrawl
Metrics
Instruction sets
i-o systems security
Cloud Computing
Database systems
database management system
Database Backup and Recovery
Data mining
data management
Conferences
Computer crashes
composability
biblio
An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network
Submitted by aekwall on Thu, 04/08/2021 - 4:36pm
ransomware behavior
malware
microsoft windows
neural nets
Neural networks
newly found research paradigm
pubcrawl
Ransomware
ransomware attacks
low-level file system
ransomware detection
ransomware families
ransomware researchers
ransomware samples
ransomware samples every day
Resiliency
retail to critical infrastructure
global surge
artificial neural network
Compositionality
Cryptography
cyber-attacks
Data collection
discovering novel ransomware families
driven effective ransomware detection scheme
effective artificial neural network structure
i-o systems security
I/O Monitoring
industry-based security researchers
Information Reuse and Security
invasive software
IRP logs
Kernel
learning (artificial intelligence)
1
2
3
4
5
next ›
last »