Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
matrix algebra
biblio
Efficiency Assessment of the Steganographic Coding Method with Indirect Integration of Critical Information
Submitted by grigby1 on Fri, 09/18/2020 - 1:47pm
image media image
digital video data platform
Discrete Cosine Transformation (DCT)
discrete cosine transformation matrix
discrete cosine transforms
efficiency assessment
embedded critical data
embedded data resistance
embedded digital data
encoding embedding
image container
image fragment
digital representation
Koch methods
Lakes
quantization coefficient
steganographic coding
steganographic coding method
steganographic embedding
structural elements
transformed image
weight coefficients
Zhao methods
Image reconstruction
security
pubcrawl
resilience
Resiliency
matrix algebra
Cryptography
Containers
Metrics
Compositionality
visualization
Image coding
Comparative Analysis
Steganography
distortion
coding theory
built-in containers
code structures
container.
critical information
data extraction
digital data container
digital platform
biblio
Speech encryption based on the synchronization of fractional-order chaotic maps
Submitted by aekwall on Tue, 09/08/2020 - 10:13am
chaotic cryptography
speech encryption
speech communication
key generation mechanism
input speech signal
Fractional-order chaotic systems
fractional-order chaotic map
exact synchronization
encryption system
encryption function
encrypting decrypting speech
Deadbeat observer
chaotic key matrix
chaotic key generator
speech processing
Chaotic systems
Cryptography
Histograms
chaotic communication
chaos
Predictive Metrics
Ciphers
Correlation
Robustness
matrix algebra
Synchronization
synchronisation
composability
pubcrawl
Resiliency
encryption
biblio
Secure Authentication Mechanism for Resistance to Password Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 3:38pm
Dictionaries
brute force attacks
shoulder surfing
password based authentication mechanism
password attacks
matrix based secure authentication mechanism
Matrix based authentication
key stroke technique
graphichical password technique
dictionary attacks
click pattern technique
Brute forcing
Cryptography
Resists
matrix algebra
policy-based governance
Human Factors
password
Force
pubcrawl
authentication
Indexes
authorisation
biblio
Research on the Destructive Capability Metrics of Common Network Attacks
Submitted by grigby1 on Fri, 08/28/2020 - 3:54pm
improved AHP judgment matrix
security
Scalability
Rough sets
rough set theory
Resiliency
resilience
pubcrawl
network index data
network attacks
network attack metrics system
Metric System
matrix algebra
Indexes
improved network metric data
Computing Theory
destructive capability metrics
destructive capability
computer network security
Communication networks
common network attacks
common attack Smurf
big data security metrics
attack type-attack attribute-attack atomic operation-attack metrics
Atomic measurements
Atomic layer deposition
analytic hierarchy process
AHP algorithm
Security Metrics
biblio
STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection
Submitted by aekwall on Mon, 08/17/2020 - 11:18am
hybrid deep neural network design
graph Laplacian matrix
attack graphs
dimensionality reduction
graph characterization vectors
graph kernel matrices
graph signal processing
graph similarity measures
graph structures
high-dimensional intrinsic representation
high-dimensional representations
hybrid deep learning models
Matrix converters
kernel-based similarity embedding vector
long-term information learning
long-term network attack detection
network communication data
real-world network attack datasets
spatial-temporal deep learning
spatiotemporal deep learning
structural similarity information
supervised classification task
temporal communication graph
traffic analysis methods
CNN
IP networks
telecommunication traffic
Kernel
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
matrix algebra
pattern classification
computer network security
convolutional neural nets
convolutional neural network
network traffic
deep learning
signal processing
LSTM
Predictive Metrics
Laplace equations
Long short-term memory
Graph Kernel
network flows
biblio
Modeling Cyber Resilience for Energy Delivery Systems Using Critical System Functionality
Submitted by aekwall on Mon, 07/20/2020 - 10:32am
Energy Delivery Systems
vulnerability graph representation
Vulnerability Graph
TOPSIS
system recovery curve
security of data
safety-critical software
Resiliency
pubcrawl
matrix algebra
graph theory
graph Laplacian matrix
Computing Theory
EDS map
cyber resilience
CSF
critical system functionality
critical cyber components
Control Theory and Resiliency
analytical hierarchy process
analytic hierarchy process
AHP
resilience
biblio
Estimating the sustainability of cyber-physical systems based on spectral graph theory
Submitted by aekwall on Mon, 07/06/2020 - 10:14am
Homeostasis
working route length
system state analysis
system ability
sustainable development
sustainability of functioning
spectral graph theory
Scalability
Resiliency
pubcrawl
Metrics
matrix algebra
information security
Human Factors
adjacency matrix
graph theory
graph spectrum
graph connectivity
Eigenvalues and eigenfunctions
eigenvalues
cyberattack
cyber-sustainability
cyber-physical systems sustainability assessment
cyber-physical systems
cyber-physical system
Cyber Dependencies
CPS sustainability
Compositionality
biblio
Elliptic curve and Lattice cryptosystem
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
lattice
Vectors
square matrices
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
Metrics
matrix algebra
Lattices
lattice-based cryptography
lattice cryptosystem
closest vector problem
Homomorphic encryption
finite local ring
encryption
Elliptic curves
Elliptic curve over a ring
Elliptic curve cryptography
elliptic curve
discrete logarithm
digital signatures
Diffie-Hellman
cryptography method
conjugate problem
biblio
Discrete Locally-Linear Preserving Hashing
Submitted by grigby1 on Fri, 06/12/2020 - 12:09pm
locally linear preserving
unsupervised methods
Unsupervised Learning
unsupervised hashing method
unsupervised hashing algorithms
unsupervised hashing
search problems
Resiliency
resilience
pubcrawl
nearest neighbour methods
nearest neighbor search
matrix algebra
locally linear structure
anchor embedding
local weight estimation
local anchor embedding algorithm
image retrieval
Image coding
hash algorithms
graph theory
discrete locally-linear preserving hashing
discrete hashing
Compositionality
Binary codes
approximate adjacent matrix
anchor graph construction algorithm
biblio
Efficient and Secure k-Nearest Neighbor Search Over Encrypted Data in Public Cloud
Submitted by grigby1 on Fri, 05/22/2020 - 2:35pm
k-NN search schemes
data owners
data points
data sharing
Electric fields
Electron traps
encrypted data
Impact ionization
Junctions
authorized data users
matrix similarity
Photoconductivity
public cloud
query privacy
search services
secure query services
valuable outsourced data
Cryptography
nearest neighbor search
k-nearest neighbor search
search problems
data storage
security property
nearest neighbour methods
Measurement
Metrics
Security analysis
Cloud Computing
data privacy
Mathematical model
matrix algebra
pubcrawl
authorisation
« first
‹ previous
1
2
3
4
5
6
next ›
last »