Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
matrix algebra
biblio
Compressive Sensing Based Feature Residual for Image Steganalysis Detection
Submitted by grigby1 on Tue, 05/01/2018 - 11:33am
image colour analysis
wavelet transforms
steganography detection
Steganography
steganalytic method
steganalysis
Sparse Representation
Sparse matrices
pubcrawl
privacy
Metrics
matrix algebra
image steganalysis detection
image representation
Image detection
image content feature analysis
BCS measurement matrix
grayscale image processing
GGD model
generalized Gaussian distribution model
gaussian distribution
Feature residual
feature extraction
DLWT coefficients
discrete wavelet transforms
directional lifting wavelet transform
Databases
compressive sensing based feature residual analysis
compressive sensing
compressed sensing
composability
block CS measurement matrix
biblio
An Improved (k,p,l)-Anonymity Method for Privacy Preserving Collaborative Filtering
Submitted by grigby1 on Mon, 04/02/2018 - 12:30pm
matrix sparsity reduction
Resiliency
resilience
recommender systems
pubcrawl
Privacy Preserving Collaborative Filtering
privacy
PPCF
Perturbation methods
Partitioning algorithms
obfuscation methods
Metrics
Maximum Distance to Average Vector microaggregation algorithm
anonymity
matrix algebra
Latent Factor Model
k-anonymity method
Human behavior
data privacy
data aggregation
Cryptography
cryptographic methods
composability
collaborative filtering
collaboration
biblio
An Information Security Risk Assessment Algorithm Based on Risk Propagation in Energy Internet
Submitted by grigby1 on Mon, 03/05/2018 - 1:12pm
partitions
threat propagation effect
security of data
security
RM algorithm
risk management
risk analysis
Resiliency
resilience
pubcrawl
propagation risk value
propagation effect
power systems
power engineering computing
composability
Nickel
Metrics
matrix algebra
logical network location
ISRADRP
internet
information system
information security risk assessment algorithm
information security risk assessment
energy internet
Dynamic Risk Propagation
dynamic networks
Dependency Structure Matrix
biblio
An Information Security Risk Assessment Algorithm Based on Risk Propagation in Energy Internet
Submitted by grigby1 on Mon, 03/05/2018 - 1:11pm
partitions
threat propagation effect
security of data
security
RM algorithm
risk management
risk analysis
Resiliency
resilience
pubcrawl
propagation risk value
propagation effect
power systems
power engineering computing
composability
Nickel
Metrics
matrix algebra
logical network location
ISRADRP
internet
information system
information security risk assessment algorithm
information security risk assessment
energy internet
Dynamic Risk Propagation
dynamic networks
Dependency Structure Matrix
biblio
Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing
Submitted by grigby1 on Tue, 01/16/2018 - 6:36pm
file servers
Security analysis
Scalability
Resiliency
query-response mechanism
query processing
Public key
pubcrawl
Metrics
matrix algebra
LSSS matrix
Human Factors
Homomorphic encryption
fully homomorphic encryption scheme
Access Control
encryption
data retrieval scheme
data privacy security
data privacy
data access
Cryptography
collusion attack
cloud servers
Cloud Computing
ciphertext retrieval
authorisation
attribute revocation
attribute encryption
biblio
A bisectional multivariate quadratic equation system for RFID anti-counterfeiting
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
Radio frequency
matrix sets
private key
private key cryptography
pubcrawl
Public key
public key cryptography
Quadratic
quantum cryptography
matrix algebra
radiofrequency identification
Resiliency
RF tag data encryption
RFID
RFID anticounterfeiting
RFIDs
set theory
Algorithm design and analysis
key generation process
Human Factors
Human behavior
Galois fields
finite field
Ergodic Matrix
EPC code
encryption process
encryption
Databases
counterfeit
BMQE system
BMQ polynomials
bisectional multivariate quadratic equation system
anticounterfeit scheme
biblio
A new elliptic curve cryptographic system over the finite fields
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
pubcrawl
matrix algebra
Menezes Qu Vanstone encryption protocols
message authentication
Metrics
network communications
private key cryptography
private key matrices
Protocols
Mathematical model
public key cryptography
public key vectors
Resiliency
Scalability
secure communication
security
square matrices
Cayley Hamilton theorem
key exchange authentication
invertible matrix
finite fields
encryption
Elliptic curves
Elliptic curve cryptography
elliptic curve cryptographic system
ElGamal
ECC
Discrete Logarithms Problems
discrete logarithms
Diffie Hellman protocol
cyber security
cryptosystems
Cryptographic Protocols
biblio
A Scalable Meta-Model for Big Data Security Analyses
Submitted by grigby1 on Fri, 11/03/2017 - 11:31am
network anomaly detection
Training data
sufficient statistics
statistical data models
security of data
security analyses
security
Scalable Security
scalable meta-model
Scalability
regression analysis
pubcrawl
Predictive models
Big Data
meta-model sufficient statistics
meta-model matrix
Meta-Model
matrix algebra
machine learning algorithms
linear regressions
linear regression models
linear regression
learning (artificial intelligence)
Data models
Conferences
Big Data security analysis
biblio
"Mapping Security Requirements to Identify Critical Security Areas of Focus in PaaS Cloud Models"
Submitted by grigby1 on Thu, 02/23/2017 - 12:47pm
Platform-as-a-Service
Software Architecture
service level objectives
security requirement mapping
security of data
Security Mappinng
security concern
security
Science of Security
pubcrawl
privacy concern
platform-as-a-service cloud models
Access Control
PaaS cloud models
PaaS cloud architectures
matrix algebra
encryption
data privacy
critical security area identification
computer architecture
Computational modeling
Cloud Computing
authentication
adaptive security mapping matrix
biblio
"A fast procedure for acquisition and reconstruction of magnetic resonance images using compressive sampling"
Submitted by grigby1 on Tue, 02/21/2017 - 12:44pm
random matrix
Matching pursuit algorithms
matrix algebra
median filtering
median filters
orthogonal matching pursuit
orthogonal matching Pursuit algorithm
Protons
pubcrawl170104
magnetic resonance imaging
recovery noise artifact suppression
restricted isometry property
sensors
sparse magnetic resonance image reconstruction
sparse magnetic resonance image sensing
Sparse matrices
sparsity
approximation theory
incoherent k-space data undersampling
incoherence
image sampling
Image reconstruction
image filtering
image denoising
Image coding
Haar transforms
Haar transform coefficients
data acquisition
compressive sampling theory
compressive sampling
compressible magnetic resonance image reconstruction
compressible magnetic resonance image acquisition
compressed sensing
« first
‹ previous
1
2
3
4
5
6
next ›
last »