Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Metrics
biblio
Data Manipulation and Digital Forensics Analysis on WhatsApp Application
Submitted by grigby1 on Fri, 09/01/2023 - 2:18pm
social networking (online)
social media forensics
instant messaging applications
data manipulation
Freeware
Internet telephony
Human Factors
mobile forensics
Instant messaging
information forensics
information security
Digital Forensics
Databases
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
A fuzzy decision tree reasoning method for network forensics analysis
Submitted by grigby1 on Fri, 09/01/2023 - 2:18pm
Forensics
reasoning method
Network forensics analysis
Fuzzy decision tree
Human Factors
Current measurement
information forensics
Systematics
computer networks
information security
network security
computer science
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Progressive Standard Operating Procedures for Darkweb Forensics Investigation
Submitted by grigby1 on Fri, 09/01/2023 - 2:18pm
Digital Forensics
Space technology
artifacts
Human Factors
Tor
drugs
cryptocurrency
darkweb
Weapons
information forensics
feature extraction
Forensics
information and communication technology
internet
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Information Theory Based Evaluation Method For Wireless IDS: Status, Open Problem And Future Trends
Submitted by grigby1 on Fri, 09/01/2023 - 1:24pm
Wireless communication
Human Factors
Solids
information theory
information theoretic security
Market research
uncertainty
Compositionality
Measurement
network security
composability
collaboration
Entropy
wireless sensor networks
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
Intrusion Detection
biblio
Game-theoretic and Learning-aided Physical Layer Security for Multiple Intelligent Eavesdroppers
Submitted by grigby1 on Fri, 09/01/2023 - 1:24pm
Wireless communication
Multiple intelligent eavesdroppers
Human Factors
Nash Equilibrium
game theory
physical layer security
information theoretic security
Compositionality
Artificial Intelligence
Games
composability
deep learning
Protocols
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
collaboration
biblio
Implementation of Physical Layer Security into 5G NR Systems and E2E Latency Assessment
Submitted by grigby1 on Fri, 09/01/2023 - 1:23pm
Compositionality
modular coding scheme
Software-defined radio
Downlink
Human Factors
codes
URLLC
wiretap channel
physical layer security
3GPP
5G
information theoretic security
collaboration
encoding
delays
composability
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
biblio
Some Discussions on PHY Security in DF Relay
Submitted by grigby1 on Fri, 09/01/2023 - 1:23pm
probability
secrecy performance analysis
Decode-and-forward
Human Factors
Computer simulation
power system reliability
Physical layer
physical layer security
information theoretic security
Performance analysis
Compositionality
collaboration
military communication
composability
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
biblio
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds
Submitted by grigby1 on Fri, 09/01/2023 - 1:23pm
Compositionality
Success Rate
side-channel analysis
Monte-Carlo simulation
Masking Scheme
Information-Theoretic Metric
Human Factors
maximum likelihood estimation
information theoretic security
Upper bound
Monte Carlo methods
Numerical models
collaboration
Measurement
side-channel attacks
composability
Scalability
Analytical models
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
biblio
Multi-Designated Receiver Authentication-Codes with Information-Theoretic Security
Submitted by grigby1 on Fri, 09/01/2023 - 1:22pm
authentication
Broadcast Authentication
authentication codes
Galois fields
Human Factors
codes
information theoretic security
Compositionality
Receivers
composability
collaboration
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
biblio
On the Security Properties of Combinatorial All-or-nothing Transforms
Submitted by grigby1 on Fri, 09/01/2023 - 1:22pm
Entropy
weak security
conditional entropy
combinatorial all-or-nothing transform
Human Factors
Transforms
perfect security
Probability distribution
information theoretic security
Upper bound
Compositionality
composability
collaboration
Cryptography
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
information security
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »