Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Cryptography
biblio
Statistical Analysis of Pseudorandom Sequences and Stegocontainers
Submitted by grigby1 on Fri, 05/20/2022 - 4:33pm
pubcrawl
Generators
Cryptography
web services
NIST
composability
Compositionality
manufacturing
statistical analysis
Industrial engineering
pseudorandom sequences
TestU01
theoretical cryptography
biblio
Secure Matrix Operations for Machine Learning Classifications Over Encrypted Data in Post Quantum Industrial IoT
Submitted by grigby1 on Fri, 05/20/2022 - 4:33pm
Compositionality
theoretical cryptography
secure matrix operations
secure IoT
privacy preserving algorithms
Post-quantum cryptography
Health
support vector machine classification
Industrial Informatics
classification
deep learning
Cybersecurity
Classification algorithms
composability
quantum computing
Cryptography
privacy
pubcrawl
machine learning
machine learning algorithms
biblio
Graph-Based Lattices Cryptosystem As New Technique Of Post-Quantum Cryptography
Submitted by grigby1 on Fri, 05/20/2022 - 4:31pm
Cryptography
pubcrawl
quantum computing
composability
encoding
Compositionality
NP-hard problem
Lattices
lattice
degree sequence
graphic lattice
Graphics
ice-flower system
sufficient conditions
topological coding
theoretical cryptography
biblio
Hardware Trojan for Lightweight Cryptoraphy Elephant
Submitted by aekwall on Thu, 05/19/2022 - 1:42pm
Cryptography
Trojan horses
Hardware
Human Factors
Conferences
pubcrawl
Scalability
Metrics
Resistance
hardware trojan
Hardware Security
Consumer electronics
Elephant
lightweight cryptography
Tamper resistance
biblio
One Layer for All: Efficient System Security Monitoring for Edge Servers
Submitted by grigby1 on Thu, 05/12/2022 - 10:51am
Virtual machining
Xen Mini-OS
virtual machine introspection
privilege separation
virtual machine security
unikernel
cyber physical systems
Intrusion Detection
operating systems
resilience
Cryptography
Libraries
Runtime
composability
Hardware
Resiliency
pubcrawl
Servers
security
biblio
MACHINE LEARNING ALGORITHMS AND THEIR APPLICATIONS IN CLASSIFYING CYBER-ATTACKS ON A SMART GRID NETWORK
Submitted by grigby1 on Thu, 05/12/2022 - 10:50am
Virtual machining
NSL-KDD data set
Hybrid SVM
Detecting Cyberat-tacks
denial of service attack
virtual machine security
FDIA
cyber physical systems
Distributed databases
resilience
Cryptography
real-time systems
composability
SVM
telecommunication traffic
Radio frequency
Resiliency
pubcrawl
Support vector machines
machine learning algorithms
biblio
SEVerity: Code Injection Attacks against Encrypted Virtual Machines
Submitted by grigby1 on Thu, 05/12/2022 - 10:50am
Virtual machine monitors
Encrypted Virtual Machines
Code Execution Attacks
AMD SEV ES
AMD SEV
virtual machine security
outsourcing
cyber physical systems
resilience
Virtualization
Cryptography
Virtual machining
Registers
Memory management
composability
privacy
Resiliency
pubcrawl
Cloud Computing
biblio
A Secure and Formally Verified Linux KVM Hypervisor
Submitted by grigby1 on Thu, 05/12/2022 - 10:50am
Cryptography
security
pubcrawl
Resiliency
Hardware
privacy
composability
Linux
Virtual machining
Virtual machine monitors
information management
resilience
cyber physical systems
virtual machine security
biblio
Implementing a Method for Docker Image Security
Submitted by grigby1 on Thu, 05/12/2022 - 10:49am
Cryptography
information security
pubcrawl
Resiliency
telecommunication traffic
composability
static analysis
malware
Containers
Virtualization
resilience
dynamic analysis
cyber physical systems
virtual machine security
docker container security
docker image security
biblio
A Dynamic and Secure Migration Method of Cryptographic Service Virtual Machine for Cloud Environment
Submitted by grigby1 on Thu, 05/12/2022 - 10:49am
quality of service
secure migration
dynamic migration
cryptographic service virtual machine
virtual machine security
cyber physical systems
resilience
cloud environment
Virtual machining
Cryptography
composability
process control
Access Control
Analytical models
Software
Resiliency
pubcrawl
Cloud Computing
1
2
3
4
5
6
7
8
9
…
next ›
last »