Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Logic gates
biblio
Industrial Control System Intrusion Detection Model based on LSTM Attack Tree
Submitted by aekwall on Thu, 04/08/2021 - 4:35pm
attack tree
Compositionality
Computer hacking
computer network security
constructed attack tree model
Hidden Markov models
ICs
IDS
industrial control
Industrial control system intrusion detection model
Information Reuse and Security
internet
Intrusion Detection
Logic gates
LSTM
LSTM & attack tree
Predictive models
pubcrawl
Resiliency
traditional intrusion detection systems
traditional network security
trees (mathematics)
biblio
EFM: An Edge-Computing-Oriented Forwarding Mechanism for Information-Centric Networks
Submitted by aekwall on Thu, 04/08/2021 - 4:28pm
edge computing
edge networks
forwarding strategy
Image edge detection
Information Centric Networks
information-centric networking
Logic gates
optimization
Packet loss
pubcrawl
Resiliency
Scalability
simulation
biblio
Simulation of Modular Exponentiation Circuit for Shor's Algorithm in Qiskit
Submitted by aekwall on Mon, 03/22/2021 - 1:13pm
Scalability
Resiliency
pubcrawl
Computational modeling
public key cryptography
quantum computing
Logic gates
Integrated circuit modeling
Registers
adders
Qubit
exponentiation
Quantum circuit
4-bit VBE quantum modular exponentiation circuit
aforementioned circuit
Ekert proposal
example simulation
integer factorization problem
large-qubit quantum computer
Qiskit
Qiskit simulator
quantum gates
quantum modular exponentiation circuit
RSA cryptosystems
Shor's Algorithm incorporating
step-by-step manner
x mod 15 circuit
biblio
An effective technique preventing differential cryptanalysis attack
Submitted by grigby1 on Wed, 03/17/2021 - 12:42pm
Logic gates
Cryptography
pubcrawl
resilience
Resiliency
Hardware
AES
Mathematical model
integrated circuit testing
Scalability
Registers
Switches
Watermarking
Hardware Security
Adaptive scan chain
adaptive scan chain circuit
adaptive scan chain structure
complicated scan chain
controller circuit
design for testability
different scan chain
differential cryptanalysis attack
plaintext analysis circuit
plaintext analysis module
plaintext analysis technique
plaintexts differs
traditional scan chain
Chained Attacks
biblio
Managing the Evolution to Future Internet Architectures and Seamless Interoperation
Submitted by grigby1 on Tue, 03/16/2021 - 2:11pm
application-layer object resolution service
architectural island separation
clean slate
COIN
collaboration
computer architecture
computer network management
content retrieval
content-oriented interoperability framework
encryption
Future Internet Architectures
Human behavior
ICN
industrial automation
information-centric networking
information-centric networks
internet
Internet architectures
internetworking
interoperability
IoT
IP networks
Logic gates
Metrics
MobilityFirst
NDN
network architecture
network management perspective
network servers
open systems
policy-based approach
Protocols
pubcrawl
resilience
Resiliency
seamless interoperation
biblio
Client-side Security Assessment and Security Protection Scheme for Smart TV Network
Submitted by grigby1 on Mon, 03/15/2021 - 1:11pm
Bridges
Cable TV
client-side
command injection attacks
composability
debugging
Logic gates
Metrics
pubcrawl
resilience
Resiliency
security
security assessment
security protection
smart TV
TV network
Web and internet services
biblio
High Efficiency Early-Complete Brute Force Elimination Method for Security Analysis of Camouflage IC
Submitted by grigby1 on Tue, 03/09/2021 - 2:37pm
Benchmark testing
Brute Force Attack
brute force attacks
Camouflage Integrated Circuit (IC)
Force
High Efficiency
Human behavior
Human Factors
integrated circuits
Intellectual Property (IP) Protection
Logic gates
policy-based governance
pubcrawl
reverse engineering
security
simulation
biblio
Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 2:33pm
black box encryption
composability
Resiliency
Metrics
black-box attacks
Cloud Computing
cloud programs
cloud services
Computational modeling
Cryptography
data privacy
Decision trees
encrypted-input program obfuscation
encryption
equivalent unobfuscated program
learning (artificial intelligence)
Logic gates
machine learning
machine learning as a service
machine learning programs
program confidentiality
program obfuscation
provable program obfuscation solution
pubcrawl
range membership programs
resilience
security
traditional cryptographic program obfuscation model
white box
White Box Security
white-box attacks
biblio
Highly Secured all Optical DIM Codes using AND Gate
Submitted by grigby1 on Tue, 02/23/2021 - 2:37pm
Logic gates
security
pubcrawl
Metrics
resilience
Resiliency
composability
telecommunication traffic
Q-factor
network coding
Optical fibers
codes
Optical fiber networks
interference suppression
Integrated optics
AND Gate
code division multiple access
correlation methods
Diagonal Identity Matrix (DIM)
highly secured all optical DIM codes
MAI reduction
multiple access interference
multiple access interference (MAI)
optical amplifiers
optical code division multiple access
Optical Code Division Multiple Access system (OCDMA)
optical communication equipment
optical diagonal identity matrices codes
optical gating
optical logic
optical systems
regularly expanding information traffic
semiconductor optical amplifier
Semiconductor optical amplifiers
spectral amplitude coding-OCDMA systems
zero cross-correlation
Zero Cross-Correlation (ZCC)
biblio
IoT Content Object Security with OSCORE and NDN: A First Experimental Comparison
Submitted by aekwall on Mon, 02/22/2021 - 1:37pm
computer network security
IP networks
Scalability
Internet of Things
Protocols
transport protocols
Resiliency
Human behavior
pubcrawl
Cryptography
internet
Libraries
Logic gates
named data networking
internetworking
ICN
Information Centric Networks
gateways
CoAP
Constrained RESTful Environments
content object security features
content security end-to-end
content transfer
DTLS
DTLS sessions
end-to-end transport
first experimental comparison
information-centric Named Data Networking protocol
IoT content Object Security
large-scale IoT
low power lossy links
measure protocol performances
MQTT-SN
multihop scenarios
NDN attains superior robustness
network experimentation
OSCORE
protocol stacks
protocol translations
proxies
request-response transactions
secure networking
security sessions
single-hop scenarios
1
2
3
4
5
6
7
8
9
…
next ›
last »