Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encoding
biblio
Reliable and Secure Multishot Network Coding using Linearized Reed-Solomon Codes
Submitted by aekwall on Mon, 04/06/2020 - 9:55am
cyber physical systems
zero-error communication
worst-case adversarial setting
wire-tap channel
unbounded computational resources
sum-subspace codes
sum-rank metric
secure multishot network coding
reliable multishot network coding
random codes
network error-correction
multishot network coding
linearized Reed-Solomon codes
linear network code
inject erroneous packets
coding scheme
telecommunication security
linear codes
Reed-Solomon codes
network coding
Knowledge engineering
error correction codes
encoding
Predictive Metrics
telecommunication network topology
computational complexity
network topology
Reliability
Decoding
composability
pubcrawl
Resiliency
biblio
An Advance Cryptographic Solutions in Cloud Computing Security
Submitted by grigby1 on Fri, 03/27/2020 - 11:28am
Human behavior
Virtualization
Safety
Safe Coding
Resiliency
resilience
pubcrawl
policy-based governance
Metrics
innovative safe cloud computing design
information management
identification mechanism
Human Factors
access management
Fingerprint recognition
encoding
Cryptography
computer security
collaboration
cloud computing security
Cloud Computing
Ciphers
biometrics (access control)
biometric knowledge
biometric coding
biometric
biblio
Multi-domain Embedding Strategies for Video Steganography by Combining Partition Modes and Motion Vectors
Submitted by aekwall on Mon, 03/09/2020 - 11:17am
MV domain
distortion-minimization framework
embedding capacity
embedding domains
image motion analysis
MDE strategies
motion estimation
motion vectors
multidomain embedding strategies
discrete cosine transforms
partition modes
potential security risks
sequential embedding
Steganography
video steganography
Video-steganography
Security Risk Estimation
minimisation
security
Resiliency
pubcrawl
Metrics
data encapsulation
video signal processing
distortion
Human Factors
Scalability
encoding
Quantization (signal)
Binary codes
-motion-vector
-multi-domain-embedding
-partition-mode
digital video
biblio
A Graph-Based Modular Coding Scheme Which Achieves Semantic Security
Submitted by grigby1 on Wed, 03/04/2020 - 4:14pm
error-correcting code
universal hash functions
theoretical cryptography
telecommunication security
Semantics
semantic security
Receivers
Random variables
pubcrawl
modular wiretap codes
graph-based modular coding scheme
graph theory
Gaussian channels
coding theory
error correction codes
encoding
Eigenvalues and eigenfunctions
edge-disjoint biregular graphs
discrete Gaussian wiretap channel
Cryptography
Compositionality
composability
channel coding
BRI function
biregular irreducible functions
security
biblio
A Proposed Approach to Build an Automated Software Security Assessment Framework using Mined Patterns and Metrics
Submitted by aekwall on Mon, 03/02/2020 - 12:30pm
security-specific properties
mined patterns
Patterns
pubcrawl
reliable software
Resiliency
Scalability
secure code
security
security of data
security-centric
Metrics
Software
software metrics
software security
software security level
Software Vulnerability
text analysis
tools
Ubiquitous Computing Security
Vulnerability prediction
Data mining
Security Metrics
automated framework
Automated Secure Software Engineering
automated software security assessment framework
building security-specific metrics
coding theory
Complexity theory
composability
current software metrics
Computing Theory
encoding
estimated security level
existing nanopatterns
generic patterns
graph theory
Human Factors
Java
Java method-level traceable patterns
machine learning
biblio
White-Box Cryptography Based Data Encryption-Decryption Scheme for IoT Environment
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
IoT environment
white-box cryptography based data encryption-decryption scheme
white-box cryptography
White Box Security
white box cryptography
transportation monitoring
symmetric encryptions algorithms
resource constrained environments
Resiliency
resilience
pubcrawl
pedestrian levels
Metrics
medical devices
Matrix decomposition
manufacturing process
advanced encryption standard
IoT devices
Internet of Things
infusion pumps
implanted devices
encryption
encoding
differential attacks
Cryptography
computer network security
composability
code lifting attacks
Ciphers
cipher block chaining mode
CBC mode.
Block Cipher
biblio
Reliable Transmission Scheme Against Security Attacks in Wireless Sensor Networks
Submitted by aekwall on Mon, 02/17/2020 - 2:33pm
pubcrawl
wireless sensor networks
Wireless Sensor Network
telecommunication security
telecommunication network reliability
sensor security
selective forwarding attacks
selective forwarding attack
security attacks
security
Routing protocols
Routing
robust recovery schemes
Resiliency
reliable transmission scheme
cluster head
Protocols
Predictive Metrics
network coding
Metrics
malicious security attacks
low energy adaptive clustering hierarchy
LEACH protocol
Human behavior
encoding
diversity coding
delays
cyber physical systems
composability
cluster routing protocols
biblio
Faster-Than-Nyquist Signaling for Physical Layer Security on Wireless Smart Grid
Submitted by aekwall on Mon, 02/17/2020 - 2:22pm
physical layer security
wireless smart grid
wireless network segment
faster-than-Nyquist signaling
faster-than-Nyquist
coding
artificial noise
signal processing
encoding
wireless networks
information protection
signal processing security
security of data
power engineering computing
smart grid security
security mechanisms
smart power grids
privacy
Metrics
composability
pubcrawl
Resiliency
information security
biblio
Cipher Modification Against Steganalysis Based on NIST Tests
Submitted by grigby1 on Mon, 02/10/2020 - 11:42am
Image edge detection
testing
steganography detection
Steganography
steganalytic method
pubcrawl
privacy
NIST tests steganalysis
NIST
Metrics
Image Steganography
arithmetic codes
Image coding
encryption
encoding
edge detection
Cryptography
composability
Ciphers
cipher modification
arithmetic source compression coding
biblio
Share, But Be Aware: Security Smells in Python Gists
Submitted by grigby1 on Mon, 02/10/2020 - 11:35am
recurrent coding patterns
tools
static code analysis
static analysis
software security
software maintenance
share code snippets
security weaknesses
security smell
security breaches
security
safety-critical software
Resiliency
resilience
composability
Python
publicly-available Python Gists
publicly-available GitHub Gists
pubcrawl
program diagnostics
password
insecure coding practices
Human behavior
hard-coded secrets
hard-coded passwords
GitHub
Gist
encoding
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »