Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Random variables
biblio
Performance of compressive sensing based energy detection
Submitted by grigby1 on Thu, 08/23/2018 - 10:41am
Resiliency
one-dimensional Gaussian Q-function
privacy
probability
Probability density function
pubcrawl
radio spectrum management
Random variables
resilience
Mathematical model
sample size low
sensing time
signal detection
signal processing
signal-to-noise ratio
spectrum sensing
Stochastic processes
test statistic
CS framework
closed-form expressions
cognitive radio
cognitive radio applications
composability
compressed sensing
compressive ratio
compressive sampling
compressive sensing
central limit theorem
cyber-physical systems
decision variable
detected idle channels
Detectors
energy detection
Gaussian processes
low-complexity approximations
biblio
Cooperative Transmission for Physical Layer Security by Exploring Social Awareness
Submitted by grigby1 on Mon, 03/05/2018 - 12:23pm
fading channels
Geometry
Human behavior
Human Factors
Jamming
Metrics
peer to peer security
Peer-to-peer computing
pubcrawl
Random variables
Relays
resilience
Resiliency
Scalability
security
biblio
Privacy-utility trade-off for smart meter data considering tracing household power usage
Submitted by grigby1 on Wed, 02/21/2018 - 12:53pm
pubcrawl
utiltiy
smart meters
smart meter
Smart Grid Privacy
Scalability
Resiliency
resilience
real-time systems
Random variables
Companies
privacy-utiltiy trade-off
privacy
Measurement
Human Factors
Human behavior
household power usage
Home appliances
data privacy
biblio
Efficient active fault diagnosis using adaptive particle filter
Submitted by grigby1 on Thu, 02/15/2018 - 10:47am
Algorithm design and analysis
fault detection
fault diagnosis
Human behavior
human factor
Human Factors
Metrics
Monitoring
multiple fault diagnosis
pubcrawl
Random variables
resilience
Resiliency
state estimation
Stochastic processes
biblio
Polar codes for arbitrary classical-quantum channels and arbitrary cq-MACs
Submitted by grigby1 on Tue, 01/16/2018 - 5:36pm
Human Factors
Scalability
Resiliency
Reliability
Receivers
Random variables
quantum successive cancellation decoder
pubcrawl
probability of error
polarization theorems
polar codes
Metrics
arbitrary Abelian group operation
Homomorphic encryption
error statistics
encoding
Electronic mail
deterministic homomorphism channels
Decoding
codes
Arikan-style transformation
arbitrary cq-MAC
arbitrary classical-quantum multiple access channels
biblio
Interactive message transmission over adversarial wiretap channel II
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
Scalability
Policy
Protocols
pubcrawl
public key infrastructure
quantum computers
Random variables
Reliability
Resiliency
perfectly secure protocol family
security
telecommunication security
two-way wiretap II channel
Upper bound
wireless channels
wireless setting
Wyner wiretap II model
information theoretic security
adversarial noise
adversarial wiretap channel II
collaboration
composability
Conferences
Cryptographic Protocols
Human behavior
human factor
active adversary
interactive message transmission
interactive protocols
Jamming
jamming signal
Metrics
Mobile communication
perfect information theoretic security
biblio
Modeling insider threat types in cyber organizations
Submitted by grigby1 on Tue, 12/12/2017 - 12:23pm
Insider Threats
trust
susceptibility
social modeling
security of data
Resiliency
Random variables
pubcrawl
Predictive models
predictability
policy-based governance
Organizations
Metrics
manipulation
knowledge based systems
insider traits
Awareness
insider threat types
insider threat
Human Factors
Human behavior
cyber security
cyber organizations
cultural differences
Computational modeling
computational model
collaboration
business data processing
Behavioral Modeling
Bayesian knowledge bases (BKBs)
Bayes methods
biblio
Optimality of the product-matrix construction for secure MSR regenerating codes
Submitted by BrandonB on Fri, 05/01/2015 - 7:32am
MSR point
Upper bound
security
Secure regenerating codes
secure MSR regenerating codes
repair traffic
regenerating codes
Random variables
product-matrix construction
product matrix construction
product matrix
Bandwidth
MSR codes
minimum storage regenerating point
matrix algebra
maintenance engineering
exact repair regenerating code security
Entropy
encoding
eavesdropper
data file
Data collection
biblio
A secret sharing scheme based on a systematic Reed-Solomon code and analysis of its security for a general class of sources
Submitted by BrandonB on Fri, 05/01/2015 - 7:13am
Cryptography
Equations
linear equations
Probability distribution
ramp secret sharing scheme
Random variables
Reed-Solomon codes
shortened systematic Reed-Solomon code
telecommunication security
biblio
Optimality of the product-matrix construction for secure MSR regenerating codes
Submitted by BrandonB on Thu, 04/30/2015 - 11:40am
MSR point
Upper bound
security
Secure regenerating codes
secure MSR regenerating codes
repair traffic
regenerating codes
Random variables
product-matrix construction
product matrix construction
product matrix
Bandwidth
MSR codes
minimum storage regenerating point
matrix algebra
maintenance engineering
exact repair regenerating code security
Entropy
encoding
eavesdropper
data file
Data collection
« first
‹ previous
1
2
3