Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Vectors
biblio
On measures of information theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 4:40pm
Scalability
Cryptography
Resiliency
Human behavior
pubcrawl
policy-based governance
Metrics
Entropy
information theory
computational security
probability
Australia
Vectors
information theoretic security
ideal secrecy
information theoretic cryptosystem
Shannon perfect secrecy
biblio
Elgamal cryptoalgorithm on the basis of the vector-module method of modular exponentiation and multiplication
Submitted by aekwall on Mon, 03/22/2021 - 1:13pm
asymmetric cryptographic algorithms
Elgamal cryptoalgorithm
ElGamal cryptosystem
exponentiation
information flow decryption
information flow encryption
modular exponentiation
multiplication
multiplication temporal complexity
pubcrawl
public key cryptography
Resiliency
Scalability
temporal complexity
vector-modular method
vector-module method
Vectors
biblio
Nested Pipeline Hardware Self-Organizing Map for High Dimensional Vectors
Submitted by aekwall on Mon, 03/22/2021 - 1:10pm
field programmable gate arrays
FPGA
Hardware
computer architecture
Resiliency
pubcrawl
Neurons
clustering
Vectors
Pipelines
expandability
Compositionality
Clocks
pipeline processing
MNIST
self-organising feature maps
Self-organizing feature maps
frequency 60.0 MHz
fully parallel computation
high dimensional vectors
homogeneous modular structure
low-dimensional vectors
multiple clocks
nested architecture
nested pipeline hardware self-organizing map
neural chips
neural net architecture
operable clock frequency
original nested SOM
pipeline computation
Self-Organizing Map
sequential computation
single vector
VHDL
weight vector update
biblio
Multi-Robot System Based on Swarm Intelligence for Optimal Solution Search
Submitted by aekwall on Mon, 12/14/2020 - 12:37pm
pubcrawl
composability
mobile robots
multi-robot systems
Swarm Intelligence
particle swarm optimization
Vectors
sensors
Compositionality
gradient methods
Systems engineering and theory
Artificial Neural Networks
angular velocity control
DC motor rotational speed
DC motors
Gradient Field
gradient vector
gradient vectors
Multi-Robot System
multirobot system
neurocontrollers
operation system
optimal solution search
radiation sources
radio-electro-magnetic devices
Search Space
system structure
temperature generating sources
biblio
ScriptNet: Neural Static Analysis for Malicious JavaScript Detection
Submitted by aekwall on Mon, 11/30/2020 - 12:03pm
malware
invasive software
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
malware detection
Metrics
neural nets
Neural networks
machine learning
Vectors
Java
program diagnostics
deep learning
LSTM
deep learning model
policy governance
computer infection threat vector
discriminative training
Internet-scale processing
JavaScript files
neural malicious JavaScript detection
Neural models
neural static analysis
PIL model
preinformant learning
Privacy-invasive software
ScriptNet system
sequential processing layers
Internet-scale Computing Security
biblio
Universal Randomized Guessing with Application to Asynchronous Decentralized Brute—Force Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 3:37pm
query processing
computer network security
invasive software
tools
pubcrawl
Decoding
password
Random variables
Human Factors
Entropy
policy-based governance
Vectors
botnet
Brute-force Attack
asynchronous decentralized brute - force attacks
guesswork moment
memoryless systems
source coding
universal decentralized guessing strategies
universal distribution
universal randomized guessing
brute force attacks
biblio
Minimization of Black hole Attacks in AdHoc Networks using Risk Aware Response Mechanism
Submitted by grigby1 on Fri, 08/28/2020 - 12:02pm
Aerospace electronics
Attack vectors
black hole attack minimization
centralized base point
computer science
Conferences
Destination sequenced Distance Vector
destination sequenced distance vector algorithm
Dijkstra shortest path algorithm
DSDV algorithm
Heuristic algorithms
Human behavior
Intrusion Response
MANET
minimisation
mobile ad hoc network
mobile ad hoc networks
mobile devices
Mobile handsets
pubcrawl
resilience
Resiliency
risk aware
risk aware response mechanism
risk aware response technique
Routing
routing attacks
Scalability
telecommunication network routing
Vectors
biblio
AIS Transmission Data Quality: Identification of Attack Vectors
Submitted by grigby1 on Fri, 08/28/2020 - 12:02pm
AIS
AIS data
AIS networks
Artificial Intelligence
Attack vectors
automatic identification system
Coast Guard
collision avoidance
conceptual countermeasures
data quality
Europe
governments
Human behavior
legislation
marine communication
marine navigation
maritime sector
obstacle avoidance
potential attack vectors
Protocols
pubcrawl
Receivers
resilience
Resiliency
Scalability
security
security of data
Signal resolution
standards
state agencies
timing
transmission data quality
Vectors
biblio
KP-ABE with Attribute Extension: Towards Functional Encryption Schemes Integration
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
Access Control
access policies
access policy
authorisation
collaboration
Cryptography
encryption
fine-grained access control
functional encryption
functional encryption scheme integration
Identity-based encryption
IPE schemes
Iron
key policy attribute based encryption
key-policy attribute-based encryption
key-policy attribute-based encryption with attribute extension
KP-ABE
KP-ABE-AE scheme
optimisation
optimization
policy-based governance
Probabilistic logic
pubcrawl
Scalability
searchable encryption
Vectors
biblio
Detection of Covert Timing Channels with Machine Learning Methods Using Different Window Sizes
Submitted by grigby1 on Thu, 07/16/2020 - 12:17pm
composability
Compositionality
computer network security
covert channels
covert timing channel
data packets
feature extraction
hidden data
information security
learning (artificial intelligence)
Linux
machine learning
machine learning methods
network steganography
Protocols
pubcrawl
resilience
Resiliency
Scalability
TCPIP
telecommunication channels
timing
Vectors
window sizes
1
2
3
4
5
6
7
8
9
next ›
last »