Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Detectors
biblio
An Adaptive Algorithm for Grey Image Edge Detection Based on Grey Correlation Analysis
Submitted by grigby1 on Mon, 02/08/2021 - 2:02pm
grey correlation analysis
security
Scalability
Resiliency
resilience
pubcrawl
pixel detection
people vision
Metrics
Mathematical model
Image resolution
Image edge detection
grey systems
grey image edge detection
adaptive algorithm
edge pixel
edge map
edge detection
differential equations
Detectors
Correlation
composability
automatic threshold
area pixels
Analytical models
Algorithm design and analysis
adaptive threshold
biblio
Data-driven Stealthy Actuator Attack against Cyber-Physical Systems
Submitted by aekwall on Mon, 01/25/2021 - 12:54pm
actuators
stealthy attack
data-driven stealthy actuator attack
Data-Driven
cyber-physical system security
convex optimization problem
attack signal
arbitrary detectors
Technological innovation
Covariance matrices
convex programming
actuator security
computer network security
Metrics
detection rate
composability
pubcrawl
Human behavior
Resiliency
Electronic mail
cyber-physical systems
security
Detectors
biblio
Image Feature Detectors for Deepfake Video Detection
Submitted by grigby1 on Fri, 01/15/2021 - 12:11pm
feature-detector-descriptors
BRISK
comprehensive test
deep fake video detection
DeepFake Video
digital media forensics
false video detection
FAST
FAST algorithms
feature point extraction
DeepFake
feature-point detectors
HOG
image feature detectors
Information integrity
KAZE
ORB
support vector machine regression
SURF
SVM regression
Metrics
feature extraction
Support vector machines
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
Classification algorithms
Training
image classification
Detectors
regression analysis
Image forensics
object detection
Videos
video signal processing
SVM classifier
biblio
Adversarial Perturbations Fool Deepfake Detectors
Submitted by grigby1 on Fri, 01/15/2021 - 12:02pm
adversarial perturbations
Lipschitz regularization
image restoration
generative convolutional neural networks
fast gradient sign method
Deepfakes
deepfake image enhancement
deepfake detectors
Deep Image Prior
faces
DeepFake
image enhancement
generative adversarial networks
Detectors
feature extraction
Training
gradient methods
resilience
Electronics packaging
Perturbation methods
Scalability
Resiliency
Metrics
Human Factors
Human behavior
pubcrawl
Neural networks
convolutional neural nets
Unsupervised Learning
biblio
Stealthiness of Attacks and Vulnerability of Stochastic Linear Systems
Submitted by grigby1 on Fri, 11/20/2020 - 1:53pm
stochastic systems
Stochastic Computing Security
Stochastic Linear Systems
stochastic linear system
stealthy attacks
stealthiness
estimation error
Kalman filters
Steady-state
Stability analysis
Detectors
Stochastic processes
security of data
Cyber-security
Linear systems
Vulnerability
control engineering computing
Scalability
Resiliency
resilience
pubcrawl
cyber-physical systems
security
biblio
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development
Submitted by grigby1 on Tue, 11/17/2020 - 2:41pm
OWASP
access sensitive information
Android development
data leaks
defensive requirements analysis
development lifecycle
development stage
guided security requirement analysis
Mobile Apps
mobile apps flaws
mobile software engineers
necessary security knowledge
information confidentiality
OWASP mobile top ten risks
OWASP risk analysis driven security requirements specification
secure Android mobile software development
secure mobile SDLC
secure mobile software development education
security defects open doors
security requirements
software developers
useful mobile security guidelines
Operating systems security
software engineering
security
pubcrawl
Metrics
Resiliency
data integrity
security threats
composability
mobile computing
smart phones
malware
software development management
security of data
security vulnerabilities
SDLC
risk analysis
resilience
testing
Detectors
Mobile Applications
Banking
Android (operating system)
security holes
biblio
Addressing Adversarial Attacks Against Security Systems Based on Machine Learning
Submitted by grigby1 on Wed, 11/04/2020 - 2:16pm
machine learning
spam
Scalability
Resiliency
resilience
pubcrawl
poisoning attacks
poisoning attack
pattern classification
Organizations
network intrusion detection
malware
machine-learning classifiers
adversarial attacks
learning (artificial intelligence)
invasive software
Intrusion Detection
Human behavior
evasion attacks
Detectors
deep learning
cyber security platforms
cyber detector
Computer crime
AI Poisoning
biblio
Kerberos: a 48-Channel Analog Processing Platform for Scalable Readout of Large SDD Arrays
Submitted by aekwall on Mon, 10/19/2020 - 11:59am
scalable readout
low-cost multichannel readout option
monolithic array
multichannel scalable analog processing
Neutrino sources
nuclear electronics
pixellated detectors
position sensitive particle detectors
Preamplifiers
readout electronics
scalable processing solution
KATRIN experiment
SDD arrays
semiconductor counters
simple cost multichannel readout option
solid scintillation detectors
spectroscopic quality
sterile neutrino existence
TRISTAN detector development
TRISTAN project
viable processing solution
Metrics
field programmable gate arrays
Cryptography
Resiliency
Human behavior
pubcrawl
data acquisition
Semiconductor device measurement
Kerberos
Physics
Detectors
16-channel integrated programmable analog pulse processors
48-channel analog processing platform
analog ASIC-based solution
application specific integrated circuits
back-end electronics
beta-decay spectroscopy
continuous spectrum
detection modules
digital pulse processor
biblio
A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments
Submitted by grigby1 on Mon, 10/05/2020 - 2:10pm
Scalability
Human Factors
IDS approaches
individual detection accuracy increase
Intrusion Detection
multicloud environments
pubcrawl
resilience
Resiliency
higher detection accuracy
security
security of data
single cloud-based intrusion detection system
suspicious intrusions
trust
trustworthy IDS communities
untrusted IDS
computer theory
central agent
centralized architecture
Cloud Computing
cloud systems
Coalitional game theory
collaboration
complex computer systems
computer network security
Bayes methods
Cyber Attacks
Cyber-security
Detectors
f⊘yw⊘rds-Intrusion detection systems
Game Theoretical Model
game theory
Games
biblio
An Open Privacy-Preserving and Scalable Protocol for a Network-Neutrality Compliant Caching
Submitted by aekwall on Mon, 09/28/2020 - 12:17pm
Impedance
CPS Privacy
video content distribution
traffic prioritization
SSS scheme
Shamir Secret Sharing scheme
regulator authority
open privacy-preserving scalable protocol
network-neutrality compliant caching
ISP network
CP
content providers
cyber physical systems
Internet service providers
cache storage
Detectors
Silicon
Layout
Geometry
Human Factors
QoS
quality of service
Feeds
privacy
internet
Protocols
pubcrawl
Human behavior
RA
telecommunication traffic
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »