Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Upper bound
biblio
Interactive message transmission over adversarial wiretap channel II
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
Scalability
Policy
Protocols
pubcrawl
public key infrastructure
quantum computers
Random variables
Reliability
Resiliency
perfectly secure protocol family
security
telecommunication security
two-way wiretap II channel
Upper bound
wireless channels
wireless setting
Wyner wiretap II model
information theoretic security
adversarial noise
adversarial wiretap channel II
collaboration
composability
Conferences
Cryptographic Protocols
Human behavior
human factor
active adversary
interactive message transmission
interactive protocols
Jamming
jamming signal
Metrics
Mobile communication
perfect information theoretic security
biblio
Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model
Submitted by grigby1 on Wed, 01/10/2018 - 11:20am
pubcrawl
information-theoretic security
Metrics
multiparty cryptographic protocols
nonprogrammable random choices
oracle knowledge
party private count retrieval protocol
Policy
Protocols
information theoretic security
random oracle model
real-ideal paradigm
Resiliency
Scalability
security of data
Servers
Upper bound
adaptive adversaries
human factor
Human behavior
honest-but-curious security
games approach sequence
Games
game theory
game parameters
EASYCRYPT proof assistant
Databases
Cryptography
Cryptographic Protocols
concrete upper bounds
composability
Complexity theory
collaboration
biblio
A fast information-theoretic approximation of joint mutual information feature selection
Submitted by grigby1 on Thu, 12/28/2017 - 12:37pm
polynomial time
JMI maximization
JMI scales
joint mutual information feature selection
joint mutual information maximization
Metrics
minimum features subset
Mutual information
pattern classification
Policy-Governed Secure Collaboration
information theory
pubcrawl
Redundancy
Resiliency
Scalability
Science of Security
search problems
UCI datasets
unified framework
Upper bound
fast information-theoretic approximation
classification
collaboration
Complexity theory
composability
computational complexity
data analysis
data reduction
dimensionality reduction
Entropy
approximation theory
Feature Selection
feature size
filtering theory
greedy algorithms
greedy forward search
greedy search complexity
high dimensional datasets
Human behavior
Human Factors
biblio
Evaluating power system vulnerability to false data injection attacks via scalable optimization
Submitted by grigby1 on Mon, 11/27/2017 - 11:24am
Polish system
worst-case attack consequences
vulnerability assessments
upper bounds
Upper bound
state estimation
Smart Grids
security of data
scalable optimization
Resiliency
pubcrawl
power system vulnerability evaluation
power system security
power grid vulnerability analysis
Algorithm design and analysis
physical power flow maximization
optimization
mixed-integer linear program
Metrics
lower bounds
Load flow
Linear programming
integer programming
IEEE 118-bus system
Generators
false data injection cyber-attacks
composability
bi-level optimization problem
biblio
The Unreasonable Effectiveness of Address Clustering
Submitted by grigby1 on Fri, 11/03/2017 - 10:33am
merging
Upper bound
transaction microstructure
Size measurement
security of data
Scalability
Resiliency
pubcrawl
Protocols
pattern clustering
Online banking
one-to-many mapping
address clustering
financial data processing
electronic money
Electronic mail
cryptocurrency
blockchain security
blockchain
Bitcoin system
bitcoin
Bipartite graph
address reuse
biblio
"Discovery of De-identification Policies Considering Re-identification Risks and Information Loss"
Submitted by grigby1 on Thu, 02/23/2017 - 11:14am
Lattices
Upper bound
UCI machine learning repository
Synthetic aperture sonar
Safe Harbor
risk analysis
reidentification risks
pubcrawl170105
privacy leakage
privacy
learning (artificial intelligence)
Computational modeling
information loss
information entropy
HIPPA
Entropy
deidentified data
deidentification policies
de-identification
data privacy
data analysis
biblio
Probabilistic Threat Propagation for Network Security
Submitted by BrandonB on Wed, 05/06/2015 - 9:33am
infected nodes
Upper bound
threat probabilities
security
probability
probabilistic threat propagation
Probabilistic logic
Peer-to-peer computing
network security analysis
network security
network hosts
monitored networks
malicious Web destinations
malicious nodes
internet
Blacklist
graphical modeling work
graph theory
graph analytics world
graph algorithms
forensic analysis
external Internet
Digital Forensics
cyclic propagation
computer network security
community detection
Communities
Communication networks
Botnets detection
botnet
biblio
Optimality of the product-matrix construction for secure MSR regenerating codes
Submitted by BrandonB on Fri, 05/01/2015 - 7:32am
MSR point
Upper bound
security
Secure regenerating codes
secure MSR regenerating codes
repair traffic
regenerating codes
Random variables
product-matrix construction
product matrix construction
product matrix
Bandwidth
MSR codes
minimum storage regenerating point
matrix algebra
maintenance engineering
exact repair regenerating code security
Entropy
encoding
eavesdropper
data file
Data collection
biblio
Secure DoF of MIMO Rayleigh block fading wiretap channels with No CSI anywhere
Submitted by BrandonB on Thu, 04/30/2015 - 11:48am
radio receivers
Upper bound
transmitting antennas
transmitter
telecommunication security
s.d.o.f
receiving antennas
Receivers
receiver
Rayleigh channels
radio transmitters
antennas
multiple input multiple output
MIMO Rayleigh block fading wiretap channels secure DoF
MIMO communication
MIMO
Fading
discrete signalling
degrees of freedom
CSI
Coherence
channel state information
biblio
Optimality of the product-matrix construction for secure MSR regenerating codes
Submitted by BrandonB on Thu, 04/30/2015 - 11:40am
MSR point
Upper bound
security
Secure regenerating codes
secure MSR regenerating codes
repair traffic
regenerating codes
Random variables
product-matrix construction
product matrix construction
product matrix
Bandwidth
MSR codes
minimum storage regenerating point
matrix algebra
maintenance engineering
exact repair regenerating code security
Entropy
encoding
eavesdropper
data file
Data collection
« first
‹ previous
1
2
3
4