Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Detectors
biblio
A new X-ray backscatter technology for aviation security applications
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
suspicious object detection
non-intrusive imaging
object detection
one-sided access method
packet parcel
pubcrawl170112
security applications
sensor arrays
supply chain security
National security
threat detection accuracy
twisted-slit collimator
X-ray backscatter camera
X-ray backscatter image enhancement
X-ray backscatter imaging
X-ray backscatter technology
X-ray detection
X-ray imaging
digital radiography
Airports
aviation security applications
avionics
backscatter
Cameras
collimators
detection of dangerous materials
Detectors
air safety
explosive detection
explosive simulants
high-resolution digital detector arrays
Inspection
luggage
luggage inspection
mock-up dangerous materials
biblio
Evolutionary multi-view face tracking on pixel replaced image in video sequence
Submitted by grigby1 on Wed, 03/08/2017 - 2:13pm
Detectors
Face
genetic algorithms
Histograms
Image color analysis
privacy
pubcrawl170113
surveillance
biblio
Controllable Face Privacy
Submitted by grigby1 on Wed, 03/08/2017 - 2:12pm
identity alteration control
visual analytics
Training
t-closeness mechanism
subspace decomposition
Shape
pubcrawl170113
privacy-protection mechanisms
privacy
mutually orthogonal subspaces
L-diversity mechanism
k-anonymity mechanism
Image coding
Cameras
facial attributes
face recognition
face images
face encoding scheme
face de-identification
Face
Detectors
data privacy
controllable face privacy concept
computer vision analysis
computer vision
biblio
"Towards a science of anomaly detection system evasion"
Submitted by abfox on Tue, 02/14/2017 - 2:27pm
advanced persistent threat
anomaly detection system evasion
computer network security
Detectors
Entropy
estimation
evade detection
Grippers
Intrusion Detection
intrusion detection system
key based randomization scheme
launch evasion attack
parameter estimation
parameter estimation attacks
pubcrawl170101
biblio
SiGe Clock and Data Recovery System Based on Injection-Locked Oscillator for 100 Gbit/s Serial Data Link
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
serial data link
microwave oscillators
millimeter-wave data communication
Oscillators
phase comparator
Phase locked loops
phase noise
phase tracking
phase-locked loop (PLL)
power 1.4 W
Logic gates
SiGe
size 130 nm
Synchronization
time 1.2 ps
voltage 2.3 V
Voltage control
windowed phase comparator
zero bit patterns
comparators (circuits)
BiCMOS integrated circuits
BiCMOS SiGe
bit rate 100 Gbit/s
bit rate 50 Gbit/s
CDR system
clock and data recovery (CDR)
clock and data recovery circuits
clock and data recovery system
Clocks
100 Gbps
Detectors
frequency 100 GHz
frequency 25 GHz
frequency tracking
Ge-Si alloys
injection locked oscillators
injection-locked oscillator
injection-locked oscillator (ILO)
biblio
Self-Diagnosis for Detecting System Failures in Large-Scale Wireless Sensor Networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:33pm
Measurement
wireless sensor networks (WSNs)
wireless sensor networks
Wireless communication
traffic-sensitive sensor network
TinyD2
telecommunication traffic
telecommunication network reliability
state transitions
sink-based tool
self-diagnosis tool
Self-diagnosis
network diagnosis
100-node indoor testbed
large-scale wireless sensor network
indoor radio
GreenOrbs system
fault diagnosis
fault detector
fault detection
fault decision process
failure detection system
diagnosing sensor network
Detectors
debugging
accept state
biblio
A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system
Submitted by BrandonB on Wed, 05/06/2015 - 9:01am
security of data
network traffic
NicheMGA algorithm
normal feature vector extraction
NS2 simulator
Routing attack
routing attack simulation
Routing protocols
rushing simulator
security
network topology
spherical detector
telecommunication network routing
telecommunication network topology
telecommunication security
telecommunication traffic
Vectors
wireless mobile node
wormhole simulator
flooding simulator
AIS
AODV-based MANET
artificial immune system
artificial immune systems
Biological cells
blackhole simulator
Detectors
dynamic intrusion detection technique
feature extraction
ad hoc network
GA
genetic algorithm
genetic algorithms
Heuristic algorithms
Intrusion Detection
mobile ad hoc network
mobile ad hoc networks
neighbor simulator
biblio
Defense on the Move: Ant-Based Cyber Defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:19am
Mobile communication
target tracking
Swarm Intelligence
Statistics
security of data
protected infrastructure
Particle swarm intelligence
optimisation
MTD
moving-target defense
mobile resilient defense
ant-based cyber defense
malware
digital ants
Detectors
defended systems
Database systems
Cyberspace
Cybersecurity
computer security
Computer crime
biblio
Automated fault diagnosis in Multiple Inductive Loop Detectors
Submitted by BrandonB on Tue, 05/05/2015 - 9:17am
vehicles
Transfer Function
traffic flow detectors
series-connected multiple inductive loop detectors
Resonant frequency
Multiple Inductive Loop Detectors
inductive sensors
Frequency response
fault location
fault diagnosis
embedded systems
Embedded System
Detectors
Circuit faults
automated fault diagnosis
biblio
Automated Intrusion Response System Algorithm with Danger Theory
Submitted by BrandonB on Tue, 05/05/2015 - 9:13am
Detectors
security
real-time systems
real-time network danger evaluation equation
network security
memory detector
Mathematical model
Knowledge Discovery
immature detector
distributed computing
adaptive automated intrusion response system
danger theory
danger evaluation
computer network security
Communication networks
automated intrusion response system
artificial immune systems
artificial immune system
artificial immune
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »