Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Cryptography
biblio
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
Cryptography
Predictive models
machine learning
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
random forests
recurrent neural nets
cyberattacks
deep learning
pattern classification
malware
invasive software
malware detection
nearest neighbour methods
k-nearest neighbors
Random Forest
advanced persistent threat
APT
deep neural networks
encoding
Long short-term memory
LSTM
defense mechanisms
advanced persistent threats
antivirus applications
APTs
behavior profiling
benign compression
classification model
collaborative attacks
computational resources
cryptographic operations
cryptojacking
cryptomining
DeCrypto Pro
DeCrypto Profiler framework
deep cryptomining profiler
mission-critical cybersystems
model selection
operating context profiling system
performance counters
Ransomware
system features
system functionalities
Trojan Laziok
utility function
Windows performance counters
biblio
Chaos-based Cryptography for Transmitting Multimedia Data over Public Channels
Submitted by grigby1 on Fri, 01/22/2021 - 12:52pm
chaotic cryptography
pubcrawl
8-bit ASCII code
adaptive signal processing
bandwidth allocation
chaos
chaos-based cryptography
chaotic communication
chaotic nonautonomous Duffing oscillator
Communication channels
crypto-analysis methods
Cryptography
Encryption technique
internet
Lyapunov methods
Lyapunov-based adaptive technique
Multimedia communication
multimedia data
multimedia signals
multiple chaotic orbits
network security
Oscillators
public communication channel
Receivers
telecommunication channels
time series
Transmitters
biblio
End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
Submitted by grigby1 on Fri, 01/22/2021 - 12:52pm
chaotic cryptography
pubcrawl
cellular radio
cellular technologies
chaotic algorithm
chaotic communication
Cryptography
dynamic keys
encryption
end-to-end voice encryption
Global System for Mobile
GSM
GSM network
military radio
multicircular permutations
multiple circular
multiple circular chaotic permutation
Receivers
security systems
telecommunication security
telecommunication technology
trunked radio
voice communication
voice data security
voice encryption
wireless mobile communication
biblio
FPGA Implementation of Internet Key Exchange Based on Chaotic Cryptosystem
Submitted by grigby1 on Fri, 01/22/2021 - 12:52pm
chaotic cryptography
pubcrawl
4-dimension chaotic system
chaotic communication
chaotic cryptosystem
chaotic cryptosystem solution
computer network security
Cryptographic Protocols
Cryptography
data phase transfer
DH-HEMTs
field programmable gate arrays
FPGA
FPGA implementation
IKE
IKE protocol
internet
Internet key exchange protocol
IPsec
IPSec protocol
keys phase exchange
man in the middle attack
network communication domain
network protocol
Protocols
SA
securing communications
security association attack
Synchronization
word length 128 bit
biblio
Comparison of Cryptography by Chaotic Neural Network and by AES
Submitted by grigby1 on Fri, 01/22/2021 - 12:51pm
chaotic cryptography
pubcrawl
AES cipher
AES ciphering
chaos
Chaotic maps
chaotic neural network approach
chaotic neural networks
Cryptography
neural nets
short plaintexts
text encryption
biblio
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
Submitted by grigby1 on Fri, 01/22/2021 - 12:51pm
chaotic cryptography
pubcrawl
2D logistic map
block ciphers
chaotic communication
chaotic system
cipher algorithm
Ciphers
Classification algorithms
computational complexity
Constrained Devices
Cryptography
cryptography algorithms PRESENT
data communication
encryption
generated sequence keys
hybrid modified lightweight algorithm
Information systems
information technology
lightweight cryptography
NIST
NIST suite
pseudorandom keys
Salsa20
stream cipher
symmetric cipher
symmetric encryption
traditional cryptography algorithms
biblio
An Image Encryption Schema Based on Hybrid Optimized Chaotic System
Submitted by grigby1 on Fri, 01/22/2021 - 12:50pm
chaotic cryptography
pubcrawl
2D logistic chaotic system
chaos
chaotic communication
chaotic image encryption algorithm
compounded chaotic system
Correlation
Cryptography
encryption
henon chaotic system
Henon mapping
Histograms
hybrid optimized chaotic system
Image coding
image cryptosystem
image encryption
image encryption schema
Logistics
Lyapunov exponents
new 2d-logistic chaotic System
optimisation
optimized henon
optimized henon mapping
probability density
Security analysis
biblio
Cryptography by Synchronization of Hopfield Neural Networks that Simulate Chaotic Signals Generated by the Human Body
Submitted by grigby1 on Fri, 01/22/2021 - 12:50pm
chaotic cryptography
pubcrawl
asymmetric cryptography method
chaotic communication
chaotic signal simulation
chaotic synchronization
Cryptography
dynamic systems
Dynamical Systems
encryption circuit
field programmable gate arrays
FPGA
Hopfield neural nets
Hopfield neural networks
human body
information security
Neural networks
random number generation
random number sequence
reconfigurable architectures
reconfigurable hardware
synchronisation
Synchronization
biblio
JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets
Submitted by grigby1 on Wed, 01/20/2021 - 3:21pm
API
APIs
application program interfaces
application programming interface
auditability
Big Integers
certification
certification transparency
Compositionality
Cryptography
data types
elliptic curve operations
Elliptic curves
generic library
Hardware
interoperability
Java
JavaCard
JavaCard API
JavaCard applets
JavaCard multiapplication platform
JCMathLib
Libraries
low-level cryptographic operations
low-level cryptographic primitives
memory footprint
nondisclosure agreements
open code sharing
open library
open systems
open-source development
open-source licenses
optimisation
optimization
proprietary APIs
proprietary manufacturer-specific APIs
pubcrawl
public domain software
resilience
Resiliency
resource-constrained platforms
smart cards
smartcards
software libraries
standards
transparency
wrapper cryptographic library
biblio
Automated Analysis of PUF-based Protocols
Submitted by grigby1 on Wed, 01/20/2021 - 3:21pm
Analytical models
API
APIs
application programming interface
Compositionality
Cryptographic Protocols
Cryptography
Data models
error correction data
fingerprint identification
formal methods and verification
Hardware
hardware-based security
integrated circuit
integrated circuits
mutual authentication protocol
physical unclonable functions
Protocols
pubcrawl
PUF API
PUF-based protocols
pufs
resilience
Resiliency
Security Properties
security protocols
Tamarin prover
1
2
3
4
5
6
7
8
9
…
next ›
last »