Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
matrix algebra
biblio
Binarized Attributed Network Embedding via Neural Networks
Submitted by grigby1 on Tue, 02/23/2021 - 2:36pm
Hamming space
Knowledge engineering
autoencoder
attribute similarity penalizing term
Attributed Network
binary code learning
data reduction
dimension reduction
feature aggregation
network coding
learned binary representation vectors
network embedding
node classification
node clustering
relaxation-quantization method
unsupervised neural based binarized attributed network embedding
Weisfeiler-Lehman Proximity Matirx
Weisfeiler-Lehman proximity matrix
composability
feature extraction
Neural networks
pubcrawl
Metrics
resilience
Resiliency
matrix algebra
optimization
learning (artificial intelligence)
Data mining
pattern classification
neural nets
Task Analysis
network theory (graphs)
pattern clustering
Binary codes
neural network training
biblio
Encryption algorithm based on knight’s tour and n-neighbourhood addition
Submitted by aekwall on Mon, 02/15/2021 - 4:50pm
Knight’s Tour Matrix
Signal processing algorithms
signal processing
Resiliency
pubcrawl
Partitioning algorithms
n-neighbourhood addition
n-neighborhood addition
Matrix converters
matrix algebra
KT matrix
Knight’s Tour Problem (KTP)
composability
Knight's Tour Problem
knight tour matrix
Image Processing
image encryption
encryption algorithm
encryption
efficient encryption
digital images
cyber physical systems
Cryptography
cover images
biblio
DNA based Computing Encryption Scheme Blending Color and Gray Images
Submitted by aekwall on Mon, 02/08/2021 - 1:51pm
Human behavior
encryption
Encryption Biometric image
encryption key
encryption scheme blending color
face recognition
fingerprint identification
fingerprint image
Fingerprint recognition
gray fingerprint images
DNA sequence
Image coding
Image color analysis
image colour analysis
image sequences
matrix algebra
Predictive Metrics
privacy
pubcrawl
Resiliency
Cipher
resilience
Scalability
Metrics
attacks
authentication
authorisation
biometric image
Blending
blending images
biometric encryption
color images
computing method
Conversions
Cryptography
DNA
DNA computing
DNA computing algorithm
DNA cryptography
biblio
Network Security Analysis of Industrial Control System Based on Attack-Defense Tree
Submitted by grigby1 on Wed, 02/03/2021 - 12:55pm
fuzzy consistency matrix
security attributes
attack behavior
attack-defense tree model
automatic control system
defense leaf nodes
defense measures
defense node
fuel systems
fuzzy analytic hierarchy process
Oils
leaf node characteristics
network risk assessment
network security analysis
network security scheme
Petroleum
quantifiable attack-defense tree model
security attribute weight
typical airport oil supply
industrial control
security
pubcrawl
resilience
Resiliency
computer network security
matrix algebra
Analytical models
Scalability
Decision Making
risk management
Industrial Control Systems
industrial control system
network attack
Airports
trees (mathematics)
probability
Atmospheric modeling
analytic hierarchy process
biblio
Neural Style Transfer for Picture with Gradient Gram Matrix Description
Submitted by aekwall on Mon, 02/01/2021 - 11:42am
neural style transfer
texture style
texture expression
texture details
stylized pictures
style loss
picture stylize
output stylized picture
muddiness
gradient gram matrix description
Gradient Gram matrix
Gradient Gram description
art style transfer
Scalability
Electrical Engineering
image texture
US Department of Defense
Predictive Metrics
Image reconstruction
automation
matrix algebra
pubcrawl
Resiliency
Runtime
Internet of Things
biblio
Identification of Computer Displays Through Their Electromagnetic Emissions Using Support Vector Machines
Submitted by aekwall on Mon, 12/14/2020 - 12:28pm
information security
Training
TEMPEST information security problem
tempest
Support vector machines
signal processing
security of data
Resiliency
pubcrawl
Predictive Metrics
pattern classification
Monitoring
matrix algebra
Kernel
computer displays
Image reconstruction
image classification
F1-score
Electromagnetics
electromagnetic emissions
display image capture
confusion matrix
Computer graphics
Antenna measurements
Artificial Intelligence
classification
composability
biblio
Integrated Reliability Analysis of Control and Information Flow in Energy Internet
Submitted by grigby1 on Wed, 12/02/2020 - 1:53pm
power information
Decision Making
effective path change
electricity business process
energy internet
incidence matrix
information network
integrated reliability analysis
internet
link interruption scenarios
matrix algebra
network topology
power business decision-making
coupling model
power markets
power service controllability
probability
probability index
pubcrawl
Reliability
resilience
Resiliency
Scalability
telecommunication power management
Topology
computer network reliability
Bayesian conditional probability theory
Bayesian network
bi-network interactive model
communication congestion
communication interruption
communication links
Communication networks
communication nodes
communication transmission instructions
communication-communication incidence matrices
communication-control incidence matrices
Bayes methods
connectivity probability calculation method
control instructions
control reliability
control-communication flow
control-communication incidence matrices
Controllability
controllability matrix
controllability metric matrix
controllability probability
Correlation
coupled congestion control
biblio
Malware Classification Using Machine Learning Algorithms and Tools
Submitted by grigby1 on Thu, 10/29/2020 - 11:10am
malware
tools
Support vector machines
Resiliency
resilience
Random Forest
pubcrawl
privacy
pattern classification
Metrics
matrix algebra
malware samples
malware classification
Classification algorithms
machine learning algorithms
machine learning
learning (artificial intelligence)
invasive software
Human behavior
feature extraction
family classification
emerging malwares
confusion matrix
comparative classification
comparable features
Cohen's Kappa
biblio
Compositional Abstraction for Networks of Control Systems: A Dissipativity Approach
Submitted by grigby1 on Mon, 10/05/2020 - 2:01pm
linear control systems
Trajectory
Temporal Logic
system nonlinearities
Symmetric matrices
storage functions
simulation functions
pubcrawl
process control
nonlinear control systems
networks of control systems
matrix algebra
Matrices
linear temporal logic specification
Linear systems
Aerospace electronics
Large-scale systems
interconnection matrix
dissipativity-type properties
dissipativity-type compositional reasoning
dissipativity approach
dissipativity
controller design process
control system synthesis
control system networks
control nonlinearities
Compositionality
compositional scheme
compositional abstraction
Approximate abstractions
biblio
Matrices From Topological Graphic Coding of Network Security
Submitted by grigby1 on Fri, 09/18/2020 - 1:47pm
Topology
vertex splitting operations
Topsnut-gpws
Topological graphic coding
topological coding matrices
topcode-matrices
splitting labellings
mathematical models
encrypted networks
edge splitting operations
coding theory
Labeling
Cryptography
graph theory
password
Compositionality
Metrics
network security
encoding
matrix algebra
Resiliency
resilience
pubcrawl
security
1
2
3
4
5
6
next ›
last »