Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Transforms
biblio
Suitability of Singular Value Decomposition for Image Watermarking
Submitted by grigby1 on Fri, 07/03/2020 - 4:53pm
image security
watermarking techniques
Watermarking
Transforms
singular value decomposition
pubcrawl
Metrics
Matrix decomposition
image watermarking
Compositionality
Image reconstruction
Image coding
False positive problem
digital images
Digital Image Watermarking
decomposition
cyber physical systems
cover image
biblio
A Multivariate Time Series Classification based Multiple Fault Diagnosis Method for Hydraulic Systems
Submitted by aekwall on Mon, 05/18/2020 - 10:49am
multiple fault diagnosis
Transforms
signal classification
nonlinear complex systems
multivariate time series classification
multivariate time series analysis
multivariable timing characteristics
multiple-faults classification
multiple faults conditions
multiple fault diagnosis method
multi-class OVO-SVM
hydraulic systems
1-NN method
Support vector machines
mechanical engineering computing
fault diagnosis
time series
Human Factors
signal detection
cyber physical systems
neural nets
Metrics
classification
pubcrawl
Resiliency
biblio
A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
Microservices Security
Application Container Security
automatic code generation techniques
business capabilities
cyber risk
diversification index
economics-of-scale incentives
microservice architectures structure
microservices attack surfaces
program compilers
moving target defense mechanism
MSA
multistep attacks
security risk assessment
security risk-oriented software diversification
Transforms
compiler security
security of data
Compositionality
moving target defense
Security Metrics
business data processing
risk analysis
Logic gates
Indexes
Software Architecture
Measurement
Metrics
pubcrawl
Resiliency
Software
security
Scalability
biblio
Towards Access Control for Network Coding-Based Named Data Networking
Submitted by grigby1 on Mon, 06/11/2018 - 3:34pm
network coding-based named data networking
linear all-or-nothing transform
linear AONT
matrix algebra
Metrics
Mobile Application
mobile computing
ndnSIM
network coding
internet
network coding-based NDN
pubcrawl
resilience
Resiliency
Security analysis
telecommunication network routing
Transforms
content producer
authorisation
authorization
authorization key
composability
computational overhead
computer network security
content delivery
content delivery effectiveness
Access Control solution
content-oriented future Internet architecture
Cryptography
encoding
encoding matrix
encryption
in-network caching
information-intensive application
biblio
Block RLS algorithm for surveillance video processing based on image sparse representation
Submitted by K_Hooper on Wed, 04/04/2018 - 9:56am
image representation
video surveillance
Transforms
Training
surveillance video processing
Surveillance video
surveillance
Scalability
Resiliency
pubcrawl
Least squares approximations
image sparse representation
background subtraction
Image reconstruction
Image Processing
Human behavior
dictionary learning
Dictionaries
computational complexity
compressed sensing system
compressed sensing
BRLS algorithm
block recursive least square algorithm
block recursive least square
biblio
A DNA Cryptographic Technique Based on Dynamic DNA Encoding and Asymmetric Cryptosystem
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
public key cryptography
finite values
fixed sized chunk
Human behavior
Metrics
Paillier
Paillier cryptosystems
plaintext
pubcrawl
equivalent binary value
random processes
random strings
Receivers
resilience
Resiliency
RSA
Transforms
asymmetric cryptosystem
equivalent ASCII values
encryption
encoding
ElGamal cryptosystems
ElGamal
dynamic DNA encoding
DNA cryptography
DNA cryptographic technique
DNA bases
DNA
data secrecy
Compositionality
Ciphertext
biocomputing
Asymmetric Encryption
biblio
MUTARCH: Architectural diversity for FPGA device and IP security
Submitted by grigby1 on Tue, 01/23/2018 - 3:24pm
policy-based governance
IP security
logical configuration keys
logic circuits
microprocessor chips
modern remote upgrade techniques
MUTARCH
physical configuration keys
Policy
IP piracy
pubcrawl
Resiliency
security through diversity principle
static keys
Table lookup
time-varying keys
Transforms
unauthorized in-field reprogramming
field programmable gate arrays
automotive systems
biomedical systems
bitstream encryption
collaboration
composability
configuration file
diverse applications
encryption
architectural diversity
FPGA device
Hardware
in-field reconfiguration
intellectual property blocks
Internet of Things
IoT
IP blocks
biblio
Performance Evaluation of VM-based Intrusion Tolerant Systems with Poisson Arrivals
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
mean-time-to-security failure
VM-based intrusion tolerant systems
virtual machines
virtual machine
Transforms
sensitive information
Resiliency
pubcrawl
poisson arrivals
Poisson arrival process
ntrusion tolerance
Nickel
MTTSF
composability
mean time to security failure
M/G/1 queueing system
Laplace-Stieltjes transforms
Laplace-Stieltjes transform
intrusion tolerance
fault-tolerant scheme
Fault tolerant systems
fault tolerance
Computers
computer security
computer network security
biblio
Frequency domain singular value decomposition for efficient spatial audio coding
Submitted by grigby1 on Thu, 12/28/2017 - 1:16pm
3D audio
audio compression
Codecs
Compositionality
Decoding
decomposition
entropy coding
frequency-domain analysis
Higher Order Ambisonics
Metrics
pubcrawl
Quantization (signal)
spatial audio coding
Transform coding
Transforms
biblio
Image security using Arnold method in tetrolet domain
Submitted by grigby1 on Mon, 11/13/2017 - 11:55am
iterative based Arnold transform
visual information
Transforms
Time Frequency Analysis
Tetrolet transform
tetrolet domain
security
Scalability
Resiliency
pubcrawl
Metrics
Iterative methods
Arnold method
image texture
image security
Image coding
hidden information
frequency-domain analysis
Entropy
encryption
Clocks
block shuffling
Arnold transforms
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »