Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
computer architecture
biblio
Ransomware Classification and Detection With Machine Learning Algorithms
Submitted by grigby1 on Fri, 03/17/2023 - 12:02pm
Conferences
Ransomware Classification
Feature Selection
Ransomware
neural network
Artificial Neural Networks
computer security
composability
Cybersecurity
computer architecture
Resiliency
resilience
Metrics
pubcrawl
machine learning
machine learning algorithms
feature extraction
biblio
A Resiliency Coordinator Against Malicious Attacks for Cyber-Physical Systems
Submitted by grigby1 on Fri, 03/17/2023 - 10:19am
computer architecture
pubcrawl
resilience
Resiliency
Software
control systems
Virtual machine monitors
cyber-physical systems
Physical layer
automation
Hierarchical Control Systems.
malicious attacks
Resiliency Coordinator
biblio
Next Word Prediction Using Deep Learning
Submitted by grigby1 on Fri, 03/03/2023 - 5:20pm
computer architecture
deep learning
Neural networks
pubcrawl
Human behavior
Metrics
Computational modeling
Sociology
Statistics
LSTM
NLP
Communications technology
keystroke analysis
BiLSTM
next word prediction
biblio
FPGA based High Throughput Substitution Box Architectures for Lightweight Block Ciphers
Submitted by aekwall on Fri, 03/03/2023 - 10:58am
security
FPGA
computer architecture
Medical services
encryption
pubcrawl
Scalability
Resiliency
Throughput
Ciphers
Generators
cyber-physical systems
Lightweight Ciphers
resource constrained devices
RFID
substitution box
biblio
Threat Detection and Response in Linux Endpoints
Submitted by grigby1 on Fri, 03/03/2023 - 9:22am
malware
osquery
Fleet server
Endpoint detection and response
Linux Operating System Security
Ransomware
resilience
Compositionality
Linux
computer architecture
architecture
composability
Correlation
Resiliency
Metrics
pubcrawl
Servers
security
biblio
SecSoC: A Secure System on Chip Architecture for IoT Devices
Submitted by grigby1 on Tue, 02/28/2023 - 5:50pm
integrated circuits
secure processor
secure architecture
reduced instruction set computing
hardware decryption
security management
hardware encryption
operating systems
Hardware Security
composability
computer architecture
IoT security
performance evaluation
Hardware
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things
Submitted by grigby1 on Fri, 02/24/2023 - 4:46pm
Internet of Battlefield Things (IoBT)
Unmanned aerial vehicle (UAV) localization
mobile edge server (MES)
convolution neural network (CNN)
autonomous aerial vehicles
Human Factors
location awareness
blockchains
iobt
computer architecture
simulation
resilience
Scalability
Resiliency
pubcrawl
blockchain
Neural networks
convolution
biblio
IoBT-OS: Optimizing the Sensing-to-Decision Loop for the Internet of Battlefield Things
Submitted by grigby1 on Fri, 02/24/2023 - 4:45pm
computer architecture
pubcrawl
Resiliency
Scalability
sensors
real-time systems
resilience
operating systems
automation
target tracking
Internet of battlefield things
iobt
Human Factors
military systems
edge intelligence
Sensing-to-Decision Loops
biblio
Securing SDN Enabled IoT Scenario Infrastructure of Fog Networks From Attacks
Submitted by grigby1 on Fri, 02/17/2023 - 5:26pm
computer architecture
Servers
pubcrawl
resilience
Resiliency
Software
Scalability
Cryptography
delays
real-time systems
energy consumption
malicious attacks
SDN security
Datagram Transport Layer Security (DTLS)
IoT-Fog networks
software defined networking (SDN)
biblio
Artificial Intelligence for SDN Security: Analysis, Challenges and Approach Proposal
Submitted by grigby1 on Fri, 02/17/2023 - 5:26pm
Resiliency
Violations Detection
Software Defined Networks
SDN security
Software algorithms
Artificial Intelligence
Protocols
Scalability
Heuristic algorithms
computer architecture
resilience
pubcrawl
machine learning
security
machine learning algorithms
deep learning
Schedules
1
2
3
4
5
6
7
8
9
…
next ›
last »