Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Telecommunications
biblio
Adoption of a Secure ECC-based RFID Authentication Protocol
Submitted by grigby1 on Fri, 03/17/2023 - 12:52pm
Internet of Things
security
pubcrawl
resilience
Resiliency
authentication
Protocols
Wireless communication
Elliptic curve cryptography
Telecommunications
ECC
RFID
Human Factors
RFIDs
authentication protocol
Wireless attack
biblio
Implementation and Performance Analysis of Lightweight Block Ciphers for IoT applications using the Contiki Operating system
Submitted by aekwall on Fri, 03/03/2023 - 10:59am
light emitting diodes
lightweight block ciphers
cooja
Contiki
Lightweight Ciphers
lightweight cryptography
Random access memory
cyber-physical systems
Sensor Systems
sensors
Telecommunications
Resiliency
Scalability
pubcrawl
operating systems
WSNs
wireless sensor networks
biblio
Effectiveness on C Flaws Checking and Removal
Submitted by grigby1 on Fri, 02/17/2023 - 5:42pm
Telecommunications
Code Correction
Buffer Overflow Vulnerabilities
Buffer overflows
software assurance
static analysis
Rail transportation
software security
embedded systems
pubcrawl
Computer languages
fuzzing
Memory management
Scalability
Software
Resiliency
resilience
biblio
Model-Agnostic Scoring Methods for Artificial Intelligence Assurance
Submitted by grigby1 on Fri, 02/17/2023 - 5:41pm
deep learning
Scoring Methods
equilibrium
AI Assurance
software assurance
Pipelines
Telecommunications
optimization
Software algorithms
Training
Scalability
Safety
Software
Resiliency
resilience
pubcrawl
security
biblio
A Framework for SDN Forensic Readiness and Cybersecurity Incident Response
Submitted by grigby1 on Fri, 02/17/2023 - 5:24pm
Telecommunications
SDN Incident Response
SDN Framework
SDN forensics
Evidence
digital forensic
centralized control
Pragmatics
software defined networking
pubcrawl
SDN security
network function virtualization
Forensics
computer security
Scalability
Resiliency
resilience
biblio
Sandbox Integrated Gateway for the Discovery of Cybersecurity Vulnerabilities
Submitted by grigby1 on Fri, 02/17/2023 - 5:11pm
Phishing
email server
Email gateway
policy governance
sandbox
sandboxing
malware
Telecommunications
Electronic mail
Logic gates
Trojan horses
composability
pubcrawl
Servers
Organizations
Engines
collaboration
biblio
Implementation of Blockchain Domain Control Verification (B-DCV)
Submitted by grigby1 on Fri, 02/03/2023 - 4:57pm
trust
SSL Trust Models
SSL/TLS
public keys
provable
DCV
ACME
PKI/CA
blockchains
Costs
Consensus algorithm
automation
Telecommunications
signal processing
ethereum
Public key
authentication
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
blockchain
security
biblio
A blockchain-based V2X communication system
Submitted by grigby1 on Tue, 11/22/2022 - 5:31pm
Organizations
ethereum
Telecommunications
RSU
Cooperative Intelligent Transport System (C-ITS)
Distributed Public Keystore (DPK)
ETSI
PKI/CA
Vehicle-to-Everything (V2X)
PKI Trust Models
signal processing
Europe
blockchain
pubcrawl
Human behavior
Human Factors
Metrics
resilience
Resiliency
Scalability
authentication
Public key
biblio
Analytical Model of Actions of the Information Security Violator on Covert Extraction of Confidential Information Processed on the Protected Object
Submitted by grigby1 on Fri, 09/30/2022 - 10:29am
Compositionality
special technical means
Materials reliability
Markov random process
Resiliency
model
random processes
Telecommunications
information theoretic security
confidential information
Probabilistic logic
information security
composability
Data models
Scalability
Analytical models
resilience
collaboration
policy-based governance
Human Factors
Human behavior
pubcrawl
biblio
Fuzzy AHP based Ranking of Cryptography Indicators
Submitted by grigby1 on Tue, 09/20/2022 - 2:33pm
Telecommunications
Fuzzy Cryptography
Quantum encryption
Multi-criteria decision-making
FAHP
Costs
Resiliency
analytic hierarchy process
RSA
encryption
Robustness
Artificial Intelligence
Scalability
AES
Hardware
resilience
Metrics
pubcrawl
1
2
3
4
5
next ›
last »