Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Complexity theory
biblio
Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model
Submitted by grigby1 on Wed, 01/10/2018 - 12:20pm
pubcrawl
information-theoretic security
Metrics
multiparty cryptographic protocols
nonprogrammable random choices
oracle knowledge
party private count retrieval protocol
Policy
Protocols
information theoretic security
random oracle model
real-ideal paradigm
Resiliency
Scalability
security of data
Servers
Upper bound
adaptive adversaries
human factor
Human behavior
honest-but-curious security
games approach sequence
Games
game theory
game parameters
EASYCRYPT proof assistant
Databases
Cryptography
Cryptographic Protocols
concrete upper bounds
composability
Complexity theory
collaboration
biblio
A fast information-theoretic approximation of joint mutual information feature selection
Submitted by grigby1 on Thu, 12/28/2017 - 1:37pm
polynomial time
JMI maximization
JMI scales
joint mutual information feature selection
joint mutual information maximization
Metrics
minimum features subset
Mutual information
pattern classification
Policy-Governed Secure Collaboration
information theory
pubcrawl
Redundancy
Resiliency
Scalability
Science of Security
search problems
UCI datasets
unified framework
Upper bound
fast information-theoretic approximation
classification
collaboration
Complexity theory
composability
computational complexity
data analysis
data reduction
dimensionality reduction
Entropy
approximation theory
Feature Selection
feature size
filtering theory
greedy algorithms
greedy forward search
greedy search complexity
high dimensional datasets
Human behavior
Human Factors
biblio
Evaluating micro patterns and software metrics in vulnerability prediction
Submitted by grigby1 on Thu, 12/28/2017 - 1:30pm
source code
pubcrawl
security
security of data
security vulnerabilities
Software
software metrics
software quality
software security
program testing
source code (software)
stand-alone Java web applications
time effective software testing
traditional class-level software metrics
traditional software metrics
vulnerability prediction model
vulnerable classes
vulnerable code
Java
Apache Tomcat
class-level patterns
class-level traceable patterns
Complexity theory
cost effective software testing
Design patterns
early detection
internet
Apache Camel
learning (artificial intelligence)
machine learning techniques
Metrics
micropatterns evaluation
Object oriented modeling
Predictive Metrics
Predictive models
predictive security metrics
biblio
Context-aware graph-based analysis for detecting anomalous activities
Submitted by grigby1 on Tue, 12/12/2017 - 1:24pm
pubcrawl
Insider Threats
maximum flow algorithm
Metrics
multimodal resources
optimisation
optimization
Organizations
policy-based governance
insider threat
query-adaptive graph-based optimization approach
Reliability
Resiliency
Support vector machines
time-dependent data
ubiquitous computing
user model mutual similarity
user profile analysis
context-dependent anomaly type
anomalous activity detection
anomalous user activity identification
Anomaly Detection
anomaly localization
anomaly occurrence
collaboration
Complexity theory
context-aware graph-based analysis
Activity Recognition
data analysis
Electronic mail
exhaustive identification
gesture recognition
graph analysis
graph theory
Human behavior
Human Factors
biblio
Analysis of Cybersecurity Based on Li-Fi in Green Data Storage Environments
Submitted by grigby1 on Mon, 12/04/2017 - 12:58pm
industrial networking
storage management
solar power
solar energy source
security of data
Scientific Computing Security
Resiliency
pubcrawl
optical prisms
optical communication
Metrics
Memory
low-cost resources
light-fidelity
Li-Fi
Cloud Computing
industrial network
green protection
Green products
green data storage environment
Green data storage
green data center
green cloud computing
data center
cybersecurity issues
cybersecurity analysis
computer security
Compositionality
Complexity theory
biblio
Predicting buffer overflow using semi-supervised learning
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Human Factors
vulnerability detection
taxonomy
software security
Semisupervised learning
semi-supervised learning
security of data
Resiliency
pubcrawl
pattern classification
Metrics
machine learning
learning (artificial intelligence)
Indexes
22-dimension vector extraction
Human behavior
Compositionality
Complexity theory
Clustering algorithms
classifier training
C/C++ source files
Buffer storage
Buffer overflows
buffer overflow vulnerability prediction
buffer overflow
AST
arrays
Antlr
biblio
Rational Proofs with Multiple Provers
Submitted by grigby1 on Mon, 07/24/2017 - 2:10pm
Complexity theory
composability
Compositionality
dc uniform circuit families
interactive proofs
multi-prover rational interactive proofs
pubcrawl
scoring rules
theoretical cryptography
biblio
SPAA-Aware 2D Gaussian Smoothing Filter Design Using Efficient Approximation Techniques
Submitted by grigby1 on Wed, 03/08/2017 - 2:03pm
Error Tolerant Applications
speed-power-area-accuracy
SPAA-aware 2D Gaussian smoothing filter design
SPAA metric
smoothing methods
rounding-off Gaussian kernel coefficient
pubcrawl170111
portable multimedia devices
nearest pixel approximation
limited battery lifetime
Kernel
Image edge detection
Gaussian Smoothing Filter
Gaussian processes
adders
energy-efficient designs
energy-efficient approximate 2D GSF architecture
energy-efficient approximate 2D Gaussian smoothing filter architecture
Energy-efficiency
Edge-detection
edge detection
computer architecture
Complexity theory
approximation theory
approximation technique
Approximation methods
Approximate design
biblio
MLDED: Multi-layer Data Exfiltration Detection System
Submitted by grigby1 on Tue, 03/07/2017 - 1:32pm
forensic readiness data exfiltration system
tuning
standards
sensitive data exfiltration detection
security
pubcrawl170109
plain ASCII text
PDF files
Organizations
organization information system
multilayer data exfiltration detection system
MLDED system
keyword labeling
keyword extraction
information protection strategy
Algorithm design and analysis
Digital Forensics
data theft
data loss
data leakage threats
data leakage
data hiding
Data Exfiltration
Data Breach
Cryptography
crime ware services
computer network security
Computer crime
Complexity theory
Communication networks
biblio
Visual structures for seeing cyber policy strategies
Submitted by grigby1 on Tue, 03/07/2017 - 1:32pm
information synthesis
visualization
visual structures
Verizon 2014 Data Breach Report
terrorist attack
Terrorism
Situation Awareness
security of data
pubcrawl170109
Organizations
information visibility
Complexity theory
Human-computer interaction
Data visualization
data visualisation
cyber security policy
cyber security
cyber policy strategies
cyber incident detection
Cyber Attacks
computer security
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
next ›
last »