Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Cryptography
biblio
Advanced Lightweight Encryption Algorithm for Android (IoT) Devices
Submitted by grigby1 on Fri, 01/06/2023 - 2:49pm
privacy
Lightweight
Resiliency
attack
Hazards
android encryption
android
Software algorithms
resilience
Receivers
Cryptography
encryption
authentication
Scalability
performance evaluation
Software
Heuristic algorithms
Metrics
Human behavior
pubcrawl
IoT
biblio
The application of white-box encryption algorithms for distributed devices on the Internet of Things
Submitted by aekwall on Tue, 12/20/2022 - 4:19pm
security
IoT
Internet of Things
encryption
pubcrawl
Metrics
Resiliency
composability
Cryptography
white-box
White Box Security
biblio
Physical Layer Security For Indoor Multicolor Visible Light Communication
Submitted by grigby1 on Tue, 12/20/2022 - 1:34pm
signal processing
pubcrawl
Metrics
resilience
Resiliency
Scalability
Cryptography
Communication system security
Wireless communication
physical layer security
lighting
optical switches
artificial noise
Multicolor visible light communication
null steering
Visible Light Communications Security
biblio
Analysis on the Growth of Artificial Intelligence for Application Security in Internet of Things
Submitted by grigby1 on Fri, 12/09/2022 - 4:56pm
composability
Human Life security
digital library
Daily lives
Solids
artificial intelligence security
Solid modeling
resilience
Artificial Intelligence
Internet of Things
Cryptography
Safety
Software
Resiliency
Metrics
Human behavior
pubcrawl
security
biblio
End Users Can Mitigate Zero Day Attacks Faster
Submitted by grigby1 on Thu, 12/01/2022 - 1:20pm
tools
cyber security
machine learning
IP networks
pubcrawl
Metrics
resilience
Resiliency
Cryptography
composability
computer security
defense
Data visualization
human computer interaction
Zero day attacks
users
biblio
Proxy-Assisted Digital Signing Scheme for Mobile Cloud Computing
Submitted by grigby1 on Tue, 11/22/2022 - 4:31pm
digital signature
Cryptography
Computational modeling
Elliptic curve cryptography
Mobile handsets
hashing
digital signatures
mobile
ECC
Elliptic curves
Scalability
proxy
PKI Trust Models
Cloud Computing
pubcrawl
Human behavior
Human Factors
Metrics
resilience
Resiliency
biblio
Vulnerability Analysis of Wireless LAN Networks using ISSAF WLAN Security Assessment Methodology: A Case Study of Restaurant in East Jakarta
Submitted by grigby1 on Fri, 11/18/2022 - 1:49pm
Cryptography
evil twin attack
Security by Default
WLAN
Informatics
Penetration Testing
Wireless fidelity
vulnerability assessment
Firewalls (computing)
Servers
authentication
Scalability
security
Software
Resiliency
resilience
pubcrawl
biblio
Reference-free Detection of LSB Steganography Using Histogram Analysis
Submitted by grigby1 on Thu, 10/20/2022 - 3:23pm
feature extraction
pubcrawl
Metrics
Correlation
privacy
Cryptography
composability
Classification algorithms
Histograms
Image coding
Steganography
Communications technology
LSB steganography
steganalysis
image tampering
steganography detection
biblio
Securing Sensitive Data Through Corner Filters, Chaotic Maps and LSB Embedding
Submitted by grigby1 on Thu, 10/20/2022 - 3:01pm
Cryptography
information security
pubcrawl
Metrics
privacy
composability
chaotic communication
Three-dimensional displays
Noise measurement
Steganography
PSNR
measurement uncertainty
chaotic function
corner detection
steganography detection
biblio
Implementation of Android Based Text to Image Steganography Using 512-Bit Algorithm with LSB Technique
Submitted by grigby1 on Thu, 10/20/2022 - 3:01pm
Ciphers
encryption
pubcrawl
Metrics
Data models
privacy
Cryptography
information and communication technology
composability
Data mining
Time complexity
Steganography
decryption
Image Steganography
least significant bit
steganography detection
1
2
3
4
5
6
7
8
9
…
next ›
last »