Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encoding
biblio
Style-Aware Neural Model with Application in Authorship Attribution
Submitted by grigby1 on Fri, 08/28/2020 - 12:22pm
Neural networks
writing style
Training
text analysis
syntax encoding
syntax
Syntactics
syntactic structure
syntactic representations
syntactic representation
stylometry
stylistic levels
style-aware neural model
semantic structure
pubcrawl
part of speech tags
attention-based hierarchical neural network
neural nets
neural model
natural language processing
Metrics
lexical representations
Human behavior
encoding
document information
Computational modeling
composability
Blogs
Benchmark testing
benchmark datasets
authorship attribution
attribution
biblio
Construction of Big Data Hyperchaotic Mixed Encryption Model for Mobile Network Privacy
Submitted by aekwall on Mon, 08/24/2020 - 1:50pm
chaotic communication
big data privacy
steganography performance
Rossle chaotic mapping
Privacy big data
piecewise linear combination method
mobile network privacy big data hybrid encryption algorithm
mobile network big data
mobile network
mixed network information sharing
mixed encrypted public key
Hyperchaos
hybrid encryption
big data hyperchaotic mixed encryption model
Steganography
piecewise linear techniques
Scalability
encoding
Ciphers
Human Factors
public key cryptography
mobile radio
Metrics
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
data privacy
Big Data
encryption
authorisation
biblio
Automated Event Prioritization for Security Operation Center using Deep Learning
Submitted by aekwall on Mon, 08/24/2020 - 12:40pm
automation
SOC workflow
SOC event classification
Security Operation Center
graphical analysis
event classification
deep neural network model
cybersecurity clearinghouse
critical security events
automated event prioritization
SIEM
Incident Response
security data
encoding
security event
Automated Response Actions
security of data
internet
pattern classification
neural nets
graph theory
deep learning
composability
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
Data models
Task Analysis
security
IP networks
IDS
biblio
SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography
Submitted by aekwall on Mon, 08/10/2020 - 10:50am
ECC
trusted scheme
SE-Enc
encoding scheme
asymmetric cryptography
Asymmetric Encryption
signature
Internet of Things devices
Compositionality
authenticated encryption
encoding
security requirements
encryption
Elliptic curves
Elliptic curve cryptography
Heuristic algorithms
public key cryptography
message authentication
Metrics
pubcrawl
Human behavior
Resiliency
Trusted Computing
Internet of Things
biblio
A hardware intellectual property protection scheme based digital compression coding technology
Submitted by grigby1 on Thu, 07/30/2020 - 1:50pm
Resiliency
intellectual property
intellectual property security
IP core watermark
IP networks
ip protection
policy-based governance
pubcrawl
resilience
industrial property
resource utilization
Robustness
security
surrounding circuit
Table lookup
watermark information
Watermarking
composability
image watermarking
hardware intellectual property protection
hardware circuit
Hardware
FPGA circuit
FPGA
field programmable gate arrays
encoding
embedding cost
Digital Watermark
digital compression coding technology
decoding function
data compression
Cryptography
Compression coding
biblio
KP-ABE Based Verifiable Cloud Access Control Scheme
Submitted by grigby1 on Fri, 07/24/2020 - 12:31pm
mobile internet
XACML policy
XACML
verifiable computation
user private key revocable key policy attribute based encryption scheme
Scalability
public verifiable computation protocol
public verifiable cloud access control scheme
Public key
pubcrawl
private key cryptography
policy-based governance
nonmonotonic access structure
Access Control
mobile devices
mobile computing
KP-ABE scheme
KP-ABE
key policy attribute based encryption
Games
encoding
collaboration
Cloud Computing
authorization policy
authorisation
biblio
A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis
Submitted by aekwall on Mon, 07/20/2020 - 10:54am
Table lookup
white box cryptography
white-box lookup table generation
white-box cryptography
white-box cryptographic implementation
white-box attacks
power analysis
gray-box attack
differential computation analysis
countermeasure
Cryptography
Power demand
encoding
Correlation
Metrics
composability
pubcrawl
Resiliency
Software
Runtime
biblio
A Formal Model for Resiliency-Aware Deployment of SDN: A SCADA-Based Case Study
Submitted by aekwall on Mon, 07/20/2020 - 10:32am
SDNSynth framework
resiliency-aware deployment
resilient operation
satisfiability modulo theories
SCADA
SCADA network
SCADA systems
SCADA-based case study
SDN architecture
SDNSynth
resiliency requirements
Smart Grid
Smart Grids
smart power grids
software defined networking
supervisory control and data acquisition network
Switches
synthesis model
synthetic SCADA systems
systematic deployment methodology
legacy forwarding devices
budget constraints
computability
Control Theory and Resiliency
deployment plan
encoding
formal model
formal modeling
hybrid network
incremental deployment
pubcrawl
network synthesis
network topology
novel grid control operations
power engineering computing
programmable SDN-enabled switches
real-time data
resilience
Resiliency
biblio
Codes for Covert Communication over Additive White Gaussian Noise Channels
Submitted by grigby1 on Thu, 07/16/2020 - 12:18pm
encoding
Xenon
Throughput
Scalability
Resiliency
resilience
pulse position modulation
pubcrawl
Phase shift keying
multilevel coding
Monte Carlo methods
modified pulse-position modulation scheme
low-complexity error-control codes
error correction codes
additive white Gaussian noise channels
discrete memoryless channels
covert communication
covert channels
covert capacity
Compositionality
composability
coding scheme
channel coding
channel capacity
binary phase-shift keying
Binary phase shift keying
AWGN channels
Amplitude shift keying
biblio
Chaotic based Image Encryption - A Neutral Perspective
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
encryption
Resiliency
resilience
Random sequences
pubcrawl
Neural networks
neural network
neural nets
information entropy analysis
Informatics
image encryption.
image encryption
Image coding
Entropy
encryption algorithm
chaos
encoding
efficient encryption
efficient algorithms
DNA
cyber-physical systems
Cryptography
correlation coefficient analysis
correlation attacks
Correlation
composability
Chaotic generators
chaotic generator
chaotic communication
chaotic based image encryption
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »