Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Random variables
biblio
An information-theoretic security metric for future wireless communication systems
Submitted by aekwall on Thu, 04/08/2021 - 3:41pm
Measurement
quantitative analysis
information theoretic security metric
information theoretic point of view
fine-grained tuning
Abstracts
Random variables
information theoretic security
wireless communication systems
security performance
Security Properties
radio networks
Scalability
Entropy
uncertainty
Metrics
Wireless communication
policy-based governance
pubcrawl
Human behavior
Resiliency
security
telecommunication security
biblio
Information-spectrum methods for information-theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 3:41pm
information-theoretic security
wiretap channels
telecommunication security
secure rates
secrecy capacity
Scalability
Resiliency
Random variables
pubcrawl
policy-based governance
Mutual information
Metrics
Jamming
Interference
channel state information
information-spectrum methods
information theory
information theoretic security
information security
Information analysis
Human behavior
feedback
fading channels
Fading
ergodic fading channels
Cryptography
complex communication scenarios
biblio
Universal Randomized Guessing with Application to Asynchronous Decentralized Brute—Force Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 2:37pm
Vectors
brute force attacks
universal randomized guessing
universal distribution
universal decentralized guessing strategies
source coding
memoryless systems
guesswork moment
asynchronous decentralized brute - force attacks
Brute-force Attack
botnet
query processing
policy-based governance
Entropy
Human Factors
Random variables
password
Decoding
pubcrawl
tools
invasive software
computer network security
biblio
Embedding Covert Information on a Given Broadcast Code
Submitted by grigby1 on Tue, 06/02/2020 - 10:54am
random codes
information theoretic security
information-theoretic security
Low Probability of Detection
Metrics
necessary conditions
original broadcast communication
policy-based governance
Probability distribution
pubcrawl
Indexes
random coding argument
Random variables
Receivers
resilience
Resiliency
Scalability
stronger receiver
Transmitters
weaker receiver
decoding error probability
Broadcast Channel
broadcast channels
broadcast code
channel capacity
channel coding
covert communication
covert communications
covert message
Decoding
asymptotic fundamental limits
degraded discrete memoryless broadcast channel
DM-BC
embedding covert information
error probability
error statistics
general DM-BCs
Human behavior
Human Factors
biblio
A Graph-Based Modular Coding Scheme Which Achieves Semantic Security
Submitted by grigby1 on Wed, 03/04/2020 - 3:14pm
error-correcting code
universal hash functions
theoretical cryptography
telecommunication security
Semantics
semantic security
Receivers
Random variables
pubcrawl
modular wiretap codes
graph-based modular coding scheme
graph theory
Gaussian channels
coding theory
error correction codes
encoding
Eigenvalues and eigenfunctions
edge-disjoint biregular graphs
discrete Gaussian wiretap channel
Cryptography
Compositionality
composability
channel coding
BRI function
biregular irreducible functions
security
biblio
Quantized Gaussian Embedding Steganography
Submitted by grigby1 on Mon, 02/10/2020 - 10:43am
multivariate Gaussian random variables
variance estimators
universal embedding scheme
testing
stego messages
steganography detection
Steganography
statistical framework
statistical analysis
Random variables
quantized Gaussian embedding steganography
pubcrawl
privacy
Payloads
optimal detector
composability
Metrics
Mathematical model
Image Steganography
Image Processing
Hypothesis testing
generalized adopted statistical model
Gaussian processes
Gaussian embedding method
Gaussian embedding
gaussian distribution
distortion
Detectors
detection error
cost-based steganography
biblio
Secure Sensor Design for Resiliency of Control Systems Prior to Attack Detection
Submitted by grigby1 on Mon, 12/16/2019 - 2:59pm
Markov processes
stochastic systems
stochastic control systems
stochastic control scenarios
sensor outputs
security of data
secure sensor design
Scalability
Resiliency
resilience
Random variables
Radio frequency
pubcrawl
process control
possible attacks
Attack detection
Human behavior
Gaussian processes
Games
game theory
Detectability
defense mechanism
cyber physical systems
Cyber Physical System
Cost function
controlled Gauss-Markov process
Control Theory
control systems
control objectives
biblio
Local-Encoding-Preserving Secure Network Coding for Fixed Dimension
Submitted by grigby1 on Thu, 12/05/2019 - 9:47am
linear codes
telecommunication security
SLNC
security-level pairs
security level
secure linear network code
Resiliency
resilience
Random variables
pubcrawl
polynomial-time algorithm
network coding
Metrics
lower bound
local-encoding-preserving secure network coding
local encoding kernel
edge detection
Kernel
information-theoretic security
information theoretic security
Information rates
information rate
Image edge detection
fixed dimension
field size
encoding
Cryptography
computational complexity
Compositionality
coding theory
security
biblio
Information Theoretical Analysis of Side-Channel Attacks to the Shannon Cipher System
Submitted by grigby1 on Thu, 02/14/2019 - 10:12am
exponential strong converse theorem
theoretical cryptography
Zinc
source coding
signal estimation
side channel-attacks
Shannon cipher system
secrecy bounds
Random variables
one helper source coding problem
information theory
information theoretical analysis
privacy
distributed sensors
Communication channels
bounded storage eavesdropper
Ciphers
side-channel attacks
Decoding
Compositionality
Cryptography
telecommunication security
composability
pubcrawl
biblio
Cryptosystem Security Evaluation Based on Diagonal Game and Information Theory
Submitted by grigby1 on Fri, 10/26/2018 - 4:04pm
Games
wireless communications networks
telecommunication security
Security Evaluation
Scalability
Random variables
pubcrawl
Metrics
information theory
Human Factors
Ciphers
game theory
game theoretic security
Entropy
diagonal Game
cryptosystem security evaluation
Cryptography
cognitive radio networks
cognitive radio
« first
‹ previous
1
2
3
next ›
last »